Konstantinos Xynos BSc, MSc, PhD

BSc (Hons) Software Engineering
MSc (Distinction) Computer Systems Security
PhD Computing

Computer Security Course Leader (all years)

Information Security Research Group
Department of Computing and Mathematics
University of South Wales
CF37 1DL, Pontypridd, UK

phone: +44 1443 483246
fax: +44 1443 654087
room: J126
e-mail (remove | placeholder): k.xynos|@|southwales.ac.uk
Linkedin: http://uk.linkedin.com/in/kxynos
My Twitter: http://twitter.com/kxynos
I maintain the ISRG Blog: isrg.blogs.southwales.ac.uk
I maintain the ISRG Twitter: https://twitter.com/isrgUSW

Fluent in: English and Greek
Understand: Afrikaans (just a bit)

Computer Security Course Leader (for all awards)

As of 2014 I have being appointed as the Computer Security Course Leader (for all awards). Any students having any issues please feel free to drop by my office (J126) or send me an email. We can then arrange to have a chat about anything. As course leader I should be the person you would go to for anything during your years of studying any Computer Security Awards at the University of South Wales.


2007 – current

  • Member of the British Computer Society (MBCS) – kxynos[at]bcs.org.uk

  • TigerScheme Ltd (Examiner) – kosta.xynos[at]tigerscheme.org

  • IEEE Member – kxynos[at]ieee.org

  • IEEE Computer Society – kxynos[at]computer.org

  • IEEE Communications Society

  • IEEE Computational Intelligence Society (2009-2011)

  • 44con UK (2016)

  • Journal: Acta Astronautica (2015-2016)

Lecturing/ Tutoring/Tutorials

2013 – 2016

  • IY2S504 – Team Project Pen Testing (BSc)

  • IY3S601 – Ethical Hacking (BSc)

  • IY4S708 – Practical Unix Security (MSc)

  • IY4S709 – Windows Security (MSc)

  • IY4S711 – Vulnerability Development (MSc)

2012 – 2013
Computer Security Award Leader (Undergraduate)

  • IY2S521 – Computer Systems Security (BSc)

  • IY2S504 – Team Project Pen Testing (BSc)

  • IY4S708 – Practical Unix Security (MSc)

  • IY4S709 – Windows Security (MSc)

  • IY4S711 – Vulnerability Development (MSc)

2011 – 2012
Computer Security Award Leader (Undergraduate)

  • SY2S21 – Network Administration & Security (BSc/HND)

  • IY4S707 – Network Security (MSc)

  • IY4S708 – Practical Unix Security (MSc)

  • IY4S709 – Windows Security (MSc)

  • IY4S711 – Vulnerability Development (MSc)

2010 – 2011
  • SY2S21 – Network Administration & Security (BSc/HND)

  • SY4S08 – Windows Security (MSc)

  • SY4S04 – Practical Unix Security (MSc)

  • SY4S02 – Network Security (MSc)

Selection of Papers


  • Huw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos and Mikhaila Burgess, (2016) A Forensic Methodology for the Analysis of a Nintendo 3DS, Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India January 4-6, 2016, www.ifip119.org


  • Davies M., Read H., Xynos K. and Sutherland I., (2015), Forensic Analysis of a Sony PlayStation 4: A First Look, DFRWS 2015 EU, Digital Investigation, Volume 12, Supplement 1, March 2015, Pages S81-S89, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2015.01.013.
    (http://www.sciencedirect.com/science/article/pii/S1742287615000146 [free access])

  • Read H., Sutherland I., Xynos K. and Roarson F., (2015), Locking out the Investigator: The need to circumvent security in embedded systems., Information Security Journal: A Global Perspective, Pages 1-9, http://dx.doi.org/10.1080/19393555.2014.998847 , Taylor & Francis

  • Read H., Xynos K., Sutherland I., and Burgess M., (2015), Toward using security alerts to assess the impact of network attacks on business processes. Norsk Informasjonssikkerhetskonferanse 2015, 23-25 Nov 2015 (to be presented), http://itkonferanse.hials.no/en/about.php

  • Read H., Xynos K., Sutherland I., Roarson F., Andriotis P. and Oikonomou G., (2015), An extensible platform for the forensic analysis of social media data, 17th International Conference on Human-Computer Interaction, HCI International 2015, Los Angeles, CA, USA, 2-7 August 2015.

  • Sutherland I., Xynos K., Jones, A., Blyth, A., (2015) The Geneva Conventions and Cyber Warfare: A Technical Approach. The RUSI Journal, Aug 2015, Vol. 160, No. 4, Routledge.


  • Sutherland, I., Read, H. and Xynos, K. (2014) Forensic Analysis of Smart TV: A current issue and call to arms, Digital Investigation, Volume 11, Issue 3, September 2014, Pages 175-178, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2014.05.019.

  • Sutherland I., Xynos K., Read H., Jones A., Drange T. (2014) A forensic overview of the LG Smart TV, Presented at the 12th Australian Digital Forensics Conference 2014 SRI Security Congress, “Security on the Move” 1-3 December, 2014, Perth, Western Australia.


  • Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth, (2013) Manipulation of hard drive firmware to conceal entire partitions, Digital Investigation,Volume 10, Issue 4, December 2013, Pages 281–286, Available online 19 November 2013, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2013.10.001.

  • Fragkos, G, Angelopoulou, O., and Xynos, K., (2013), Antivirus False Positives Alerts, Evading Malware Detection and CyberSecurity Issues, Journal of Information Warfare, Vol 12, Issue 3, Oct 2013.

  • Fragkos, G, Angelopoulou, O., and Xynos, K., (2013), The issues of software being classified as malicious by Antivirus false positive alerts, Proceedings of the European Conference on Informations Warfare and Security, 2013 (ECIW 2013), University of Jyväskylä, Finland, Jul 2013.

  • Read H., Sutherland I., Xynos K., (2013) Networked War Games: Training the Intrusion Detection Specialist, IADIS International Journal on WWW/INTERNET, Vol. 11, No. 1, pp. 53-61, ISSN: 1645-7641

  • Xynos K., Sutherland I. and Blyth A., (2013) “Effectiveness of blocking evasions in Intrusion Prevention Systems”, Whitepaper, Apr 2013. Access here: http://security.research.glam.ac.uk/media/files/documents/2013-04-22/Effectiveness_of_blocking_evasions_in_Intrusion_Prevention_Systems.pdf



  • Read H., Xynos K., Blyth A., (2009) “Presenting DEViSE: Data Exchange for Visualizing Security Events”, IEEE Computer Graphics and Applications, vol. 29, no. 3, pp. 6-11, May/June 2009, doi:10.1109/MCG.2009.48

  • Xynos K. and Blyth A. (2009) “XSM: A web service enabled database management system for relational databases” ,Proceedings of the 4th Research Student Workshop (P.A Roach (Ed.)), University of Glamorgan, Pontypridd, Wales, UK, pp.85-89, 12 March 2009. ISBN:978-1-84054-224-0

  • Xynos, Konstantinos and Blyth, Andrew, (2008), “A Modular Data Mining Architecture for Intrusion Detection Systems’ Data”, 4th European Conference on Information Warfare and Security, University of Plymouth, UK – download paper

  • Angelopoulou, O., Thomas, P., Xynos, K. and Tryfonas, T. (2007), “On-line ID theft techniques, investigation and response”, International Journal of Electronic Security and Digital Forensics, Vol. 1, No 1, pp.76–88. – download paper

  • Angelopoulou, O., Thomas, P., Xynos, K. and Tryfonas, T. (2006), “On-line ID theft techniques, investigation and response”, in Jahankhani, H. et al. (Eds.), ICGeS 2006, Proceedings of the 2nd International Conference on Global eSecurity, pp. 156-163 – download paper

  • Fragkos G., Xynos K., Angelopoulou O., Mee V., 2006, An empirical methodology derived from the analysis of information remaining on second hand hard disks, European Conference on Computer Network Defence, University of Glamorgan

  • Fragkos G., Xynos K., Blyth A., 2005, The use of computers idle-time and parallel processing over a network to perform password threat assessment, 4th European Conference on Information Warfare and Security, University of Glamorgan