Selected Information Security Research Group Publications

2016


  1. A J C Blyth, Responsibility and Roles, and their Application to Trust Management, 18th International Conference on Human-Computer Interaction, Lecture Notes in Computer Science (LNCS), Springer, 2016.

  2. Michael Okeke and Andrew Blyth, Prey Approach for Anomalies Detection on Industrial Control Systems, 18th International Conference on Industrial Control Systems, 2016

  3. Oteng Tabona and Andrew Blyth, A Forensic Cloud Environment to address the Big Data challenge in Digital Forensics, IEEE Technically Sponsored SAI Computing Conference, IEEE Press, 2016

  4. Huw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos and Mikhaila Burgess, (2016) A Forensic Methodology for the Analysis of a Nintendo 3DS, Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India January 4-6, 2016, www.ifip119.org

2015


  1. Andrew Blyth and Matthew Johnson, Chapter 7: Cyber Forensics, in Forensic Science and Beyond: Authenticity, Province and Assurance – Evidence and Case Studies, Crown Copyright, December 2015.

  2. Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart. (2015) 'A Forensic Taxonomy of SCADA Systems and Approach to Incident Response’, Proceedings of the 3rd International Symposium for ICS and SCADA Cyber Security Research 2015 (ICS-CSR 2015).

  3. Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart. (2015) 'A Cyber Forensic Taxonomy for SCADA systems in Critical Infrastructure’, Pre-proceedings of The 10th International Conference on Critical Information Infrastructures Security 2015 (CRITIS 2015).

  4. Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart (2015) 'A Review of Cyber Security Risk Assessment Methods fort SCADA Systems’, Computers & Security Journal 2015.

  5. Davies M., Read H., Xynos K. and Sutherland I., (2015), Forensic Analysis of a Sony PlayStation 4: A First Look, DFRWS 2015 EU, Digital Investigation, Volume 12, Supplement 1, March 2015, Pages S81-S89, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2015.01.013.
    (http://www.sciencedirect.com/science/article/pii/S1742287615000146 [free access])
  6. Read H., Sutherland I., Xynos K. and Roarson F., (2015), Locking out the Investigator: The need to circumvent security in embedded systems., Information Security Journal: A Global Perspective, Pages 1-9, http://dx.doi.org/10.1080/19393555.2014.998847 , Taylor & Francis
  7. Read H., Xynos K., Sutherland I., and Burgess M., (2015), Toward using security alerts to assess the impact of network attacks on business processes. Norsk Informasjonssikkerhetskonferanse 2015, 23-25 Nov 2015 (to be presented), http://itkonferanse.hials.no/en/about.php
  8. Read H., Xynos K., Sutherland I., Roarson F., Andriotis P. and Oikonomou G., (2015), An extensible platform for the forensic analysis of social media data, 17th International Conference on Human-Computer Interaction, HCI International 2015, Los Angeles, CA, USA, 2-7 August 2015, (accepted and to be presented).
  9. Sutherland I., Xynos K., Jones, A., Blyth, A., (2015) The Geneva Conventions and Cyber Warfare: A Technical Approach. The RUSI Journal, Aug 2015, Vol. 160, No. 4, Routledge.


2014

  1. Blyth A., (2014), Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture, Journal of Information Security, Volume 5, No. 2, pp 37-45, 2014.

  2. Blyth A., (2014), Understanding Security Patterns for SocioTechnical Systems via Responsibility Modelling Proceedings of the Third International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns, April 2014.

  3. Charitoudi K. and Blyth A., (2014) An Agent-Based Socio-technical Approach to Impact Assessment for Cyber Defense, Information Security Journal: A Global Perspective, pages 125-136, DOI:10.1080/19393555.2014.931492, ISSN:1939-3555 (Print), 1939-3547 (Online)

  4. Davies, H.L. and Blyth, A.J.C., (2014), Determining the Value of Information Security Investments ­ A Decision Support System, Proceedings of the 6th International Conference on Knowledge Management and Information Sharing (KMIS 2014), Pages 426 ­ 433. SciTePress. ISBN:9789897580505.

  5. Nikolaos Papakonstantinou, Seppo Sierla, Konstantinia Charitoudi, Bryan O’Halloran, Tommi Karhela, Valeriy Vyatkin, Irem Tumer, (2014) “Security Impact Assessment of industrial automation systems using genetic algorithm and simulation”, IEEE ETFA 2014, 16-19 September, 2014, Barcelona, Spain.

  6. Pringle, N. and Burgess, M.,(2014), Information Assurance in a distributed forensic cluster. In Proceedings of the 1st Digital Forensics Research Workshop Europe(DFRWS EU 2014); 2014, Digital investigation Volume 11, Supplement 1, May 2014, Pages S36S44.

  7. Sierla, S.; Hurkala, M.; Charitoudi, K.; Chen-Wei Yang; Vyatkin, V., “Security risk analysis for smart grid automation,” Industrial Electronics (ISIE), 2014 IEEE 23rd International Symposium on , vol., no., pp.1737,1744, 1-4 June 2014, doi: 10.1109/ISIE.2014.6864877

  8. Sutherland, I., Read, H. and Xynos, K. (2014) Forensic Analysis of Smart TV: A current issue and call to arms, Digital Investigation, Volume 11, Issue 3, September 2014, Pages 175-178, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2014.05.019.

  9. Sutherland I., Xynos K., Read H., Jones A., Drange T. (2014) A forensic overview of the LG Smart TV, Presented at the 12th Australian Digital Forensics Conference 2014 SRI Security Congress, “Security on the Move” 1-3 December, 2014, Perth, Western Australia.

2013


  1. Charitoudi K. and Blyth A., (2013) An Agent-Based Socio-technical Approach to Impact Assessment for Cyber Defense, 4th International Conference on Emerging Intelligent Data and Web Technologies, CEWE 2013, XI’AN, CHINA, 9-11 Sep. 2013

  2. Charitoudi K. and Blyth A., (2013) A Socio-Technical Approach to Cyber Risk Management and Impact Assessment, Journal of Information Security, Vol 4, No 1, January 2013, DOI: 10.4236/jis.2013.41005

  3. Benham A., Read H. and Sutherland I., Network Attack Analysis and the Behaviour Engine, IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), IEEE Press, Spain, March 2013.

  4. Fragkos, G, Angelopoulou, O., and Xynos, K., (2013), Antivirus False Positives Alerts, Evading Malware Detection and CyberSecurity Issues, Journal of Information Warfare, Vol 12, Issue 3, Oct 2013.

  5. Fragkos, G, Angelopoulou, O., and Xynos, K., (2013), The issues of software being classified as malicious by Antivirus false positive alerts, Proceedings of the European Conference on Informations Warfare and Security, 2013 (ECIW 2013), University of Jyväskylä, Finland, Jul 2013.

  6. Read H., Sutherland I., Xynos K., (2013) Networked War Games: Training the Intrusion Detection Specialist, IADIS International Journal on WWW/INTERNET, Vol. 11, No. 1, pp. 53-61, ISSN: 1645-7641

  7. Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth, (2013) Manipulation of hard drive firmware to conceal entire partitions, Digital Investigation,Volume 10, Issue 4, December 2013, Pages 281–286, Available online 19 November 2013, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2013.10.001.

  8. Xynos K., Sutherland I. and Blyth A., (2013) “Effectiveness of blocking evasions in Intrusion Prevention Systems”, Whitepaper, Apr 2013. Access here: http://security.research.glam.ac.uk/media/files/documents/2013-04-22/Effectiveness_of_blocking_evasions_in_Intrusion_Prevention_Systems.pdf


2012

  1. Goodwin, M. Sutherland I., Roarson F., & Drange T., (2012) Assessing the accessibility of e-learning, NOKOBIT 2012, Bodø, Norway.

  2. Sutherland I., Xynos K., Andrew Jones A. and Blyth A. (2012), Protective Emblems in Cyber Warfare, 2012 SECAU Security Congress, 3-5 December, 2012, Won: Best Paper in Theme and Best in Conference


2011

  1. Alruban, A.; Everitt, E.; , “Two Novel 802.1x Denial of Service Attacks,” Intelligence and Security Informatics Conference (EISIC), 2011 European , vol., no., pp.183-190, 12-14 Sept. 2011
    doi: 10.1109/EISIC.2011.49

  2. Morakis E., Blyth A., (2011) Defining High-Level Signatures Using the Footprint Mark-up Language (FTML), Journal of Computer Science and Engineering, January 2011,pp. 5-14, Volume 5, Issue 1

  3. Sutherland I., Davies G., Blyth A.J.C. (2011) Malware and Steganography in Hard Disk Firmware, Journal of Computer Virology, 01 July 2011, pp. 215-219, Springer Paris, Vol. 7 (3).
  4. Owen P, Thomas P (2011). “An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines.” Digital Investigation 8(2): 135-140.
  5. Owen P (2011). The challenges of capturing forensic data from NAND and NOR flash memory Mobile Phone Forensic Workshop. University of Glamorgan University of Glamorgan

2010

  1. Davies G., Sutherland, I., (2010) Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice, The 2010 ADFSL Conference on Digital Forensics, Security and Law, May 19-21, 2010 St. Paul, Minnesota, USA.

  2. Davies G., Sutherland, I., (2010) Hard Disk Workshop, The 2010 ADFSL Conference on Digital Forensics, Security and Law, May 19-21, 2010 St. Paul, Minnesota, USA.

  3. Davies G., Sutherland, I., (2010) Hard Disk Workshop, 8th Australian Digital Forensics Conference Edith Cowan University, November 28th – December 2nd, 2010.

  4. Davies G. Sutherland I, (2010), Forensic Implications of the modification of Hard Disk Firmware, Proceedings of the Fifth Research Student Workshop, University of Glamorgan, 4th February 2010
  5. Owen P , Thomas P (2010). “An Analysis of Digital Forensic Examinations.” Small Scale Digital Device Forensics Journal 4(1).
  6. Owen P, Thomas P, McPhee D (2010). An Analysis of the Digital Forensic Examination of Mobile Phones. Next Generation Mobile Applications, Services and Technologies (NGMAST), 2010 Fourth International Conference on. Amman, IEEE: 25.
  7. Sutherland I., Davies G., (2010) Hard Disk Storage: Data Leakage, 10th European Conference on Information Warfare and Security, University of Thessaloniki, Greece.

  8. Sutherland I., Davies G., Jones A, Blyth A. J.C. (2010) Zombie Hard Disks: Data from the living dead, 8th Australian Digital Forensics Conference, Edith Cowan University, November 28th – December 2nd, 2010.

  9. Jones, A., Dardick, G., Davies, G., Sutherland, I., Valli, C., Dabibi, G., (2010) The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Proceedings of the 8th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, November 30th 2010 (Affiliation was both University of Glamorgan & Edith Cowen University)

  10. Hashim, N. & Sutherland, I. (2010), An Architecture for the Forensic Analysis of Windows System Artifacts., in Ibrahim M. Baggili, ed., 'ICDF2C’ , Springer, , pp. 120-128.

  11. Xynos, K, Sutherland, I, Read, H, Everitt, E and Blyth, A, (2010), “Penetration Testing and Vulnerability Assessments: A Professional Approach”, Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western Australia, 23-24 August 2010.

  12. Xynos, K, Harries, S, Sutherland, I, Davies, G, Blyth, A, (2010), “Xbox 360: A digital forensic investigation of the hard disk drive”, Digital Investigation, Volume 6, Issues 3-4, Embedded Systems Forensics: Smart Phones, GPS Devices, and Gaming Consoles, May 2010, Pages 104-111, ISSN 1742-2876, DOI: 10.1016/j.diin.2010.02.004.

  13. Xynos K. and Blyth A. (2010) “A First-layer Authentication Method: Gateway Authentication
    Program” ,Proceedings of the 5th Research Student Workshop (P.A Roach (Ed.)),University of Glamorgan, Pontypridd, Wales, UK, pp.25-27, Feb. 2010, ISBN:978-1-84054-233-2

2009

  1. Davies G. and Sutherland I. (2009) “Forensic Implications of the modification of Hard Disk Firmware”, Proceedings of the 4th Research Student Workshop (P.A Roach (Ed.)), University of Glamorgan, Pontypridd, Wales, UK, pp.98-101, 12 March 2009. ISBN:978-1-84054-224-0

  2. Fragkos G., (2009), “Reverse-Wipe Data on a Storage Medium”, 4th International Workshop on Digital Forensics and Incident Analysis (WDFIA 2009), 25-26 June, University of Piraeus, Athens, Greece

  3. Fragkos G. and Blyth A. (2009) “Converting Malicious Computer Network Activity into Convenient Digital Footprints”, Proceedings of the 4th Research Student Workshop (P.A Roach (Ed.)), University of Glamorgan, Pontypridd, Wales, UK, pp.91-97, 12 March 2009. ISBN:978-1-84054-224-0

  4. Jones A., Dardick G., Sutherland I, Valli C., (2009) The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market. Int. J. Liability and Scientific Enquiry. Vol.2 (1), pp.53–68
  5. Owen P, Thomas P (2009). Analysis of the Methodology used in Digital Forensic Examinations CFET 2009 : Cybercrime Forensics Education & Training. Canterbury Christ Church University, CFET: 14.
  6. Owen P, Thomas P (2009). Digital forensic analysis of mobile devices HEA Computer Forensics Workshop. University of Sunderland, The Higher Education Academy.
  7. Read H., Blyth A.J.C., Sutherland I., (2009) A Unified Approach to Network Traffic and Network Security Visualisation, Conference ICC09 CISS., IEEE Proceedings.

  8. Read H., Xynos K., Blyth A., (2009) “Presenting DEViSE: Data Exchange for Visualizing Security Events”, IEEE Computer Graphics and Applications, vol. 29, no. 3, pp. 6-11, May/June 2009, doi:10.1109/MCG.2009.48

  9. Sutherland I, Davies G., Pringle. P., Blyth, A. J.C. (2009), The Impact of Hard Disk Firmware Steganography on Computer Forensics, The 2009 ADFSL Conference on Digital Forensics, Security and Law, May 20-22, 2009, Champlain College, Burlington, Vermont, USA

  10. Thomas P., Sutherland I., Tryfonas T., (2009) An Analysis of the Curriculum Components of Computer Forensics Undergraduate Courses, Higher Education Academy Journal

  11. Xynos K. and Blyth A. (2009) “XSM: A web service enabled database management system for relational databases”, Proceedings of the 4th Research Student Workshop (P.A Roach (Ed.)), University of Glamorgan, Pontypridd, Wales, UK, pp.85-89, 12 March 2009. ISBN:978-1-84054-224-0

2008

  1. Blyth A.J.C., Sutherland I., Pringle N., (2008) Tools and Techniques for Steganography and Data Insertion onto Computer Hard-Drives, 8th Annual Program Manager’s Anti-Tamper Workshop, Sponsored by US DoD Anti-Tamper Executive Agent SAF/AQL and Department of the Army, Redstone Arsenal, Huntsville, AL, USA.

  2. Fragkos G., (2008), “Converting Computer Network Malicious Activity into Digital Footprints Based on a Notional Representation”, UPGRADE, New Trends in Network Management, Vol. IX, issue no. 6, December 2008

  3. Fragkos G., Sutherland I., 2008, A novel approach to computer forensics on how to wipe data in a storage medium, 3rd Research Student Workshop is an IEEE associated event, University of Glamorgan

  4. Hoad R., Sutherland I. (2008) Malicious Electromagnetic (EM) Threats to Information Processing Installations – How do we Respond and Protect?, 8th European Conference on Information Warfare and Security, University of Plymouth, UK.

  5. Jones, A., Valli, C., & Sutherland, I. (2008). Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market. Journal of Digital Forensics, Security and Law, 3(2).

  6. Jones, D., Sutherland I., Tryfonas, T., (2008) Global Positioning Systems: Analysis Principles and Sources of Evidence in User Devices Proceedings of the Third Workshop on Digital Forensics and Incident Analysis, IEEE Proceedings, Malaga, October 2008

  7. Kearney, B. and Tryfonas, T. (2008), “Automating the Continuous Auditing of Application Systems with Security Patterns”, Information Security Journal: A Global Perspective, 17(1), pp. 13-25.

  8. Pringle N., Sutherland I., (2008) “Is a Computational Grid a Suitable Platform for High Performance Digital Forensics?”, 8th European Conference on Information Warfare and Security, University of Plymouth, UK.

  9. Styles, M. and Tryfonas, T. (2008), “Cultivating an Atmosphere of Proactive Computer Security to Mitigate Limited End-User Awareness”, accepted, to appear at the Second International Symposium on Human Aspects of Information Security & Assurance, HAISA 2008, Plymouth.

  10. Sutherland, I., Evans, J., Tryfonas, T., and Blyth, A. (2008) “Acquiring volatile operating system data tools and techniques.”, SIGOPS Oper. Syst. Rev. 42, 3 (Apr. 2008), 65-73. DOI= http://doi.acm.org/10.1145/1368506.1368516

  11. Sutherland I., Jones A., (2008) Industrial Espionage from Residual Data: Risks and Countermeasures, 6th Australian Digital Forensics Conference Edith Cowan University December 1 – 3, 2008

  12. To, W.M., Tryfonas, T. and Farthing, D. (2008), “Audit Log Review and Unification via the Use of a Log Management Information Base”, Eighth International Baltic Conference on DB and IS June 2-5, 2008 Tallinn, Estonia.

  13. Tryfonas, T. and Kearney, B. (2008), “Standardising the Audit Automation of Integrated Business Applications with Security Patterns”, Computer Standards & Interfaces, Vol. 30, Issue 4, pp. 262-270.

  14. Xynos, Konstantinos and Blyth, Andrew, (2008), “A Modular Data Mining Architecture for Intrusion Detection Systems’ Data”, 4th European Conference on Information Warfare and Security, University of Plymouth, UK

2007

  1. Angelopoulou, O., Thomas, P., Xynos, K. and Tryfonas, T. (2007) 'Online ID theft techniques, investigation and responses’, Int. J. Electronic Security and Digital Forensics, Vol. 1, No. 1, pp.76–88.
  2. Blyth, A., Sutherland, I. and Tryfonas, T. (2007), “Outlining an architecture for an XML application firewall”, in Jahankhani, H. and Palmer-Brown, D. (Eds.), ICGeS 2007, Proceedings of the 3rd International Conference on Global e-Security, University of East London, London, UK, pp. 152-159.
  3. Fragkos G., 2007, Being able to Regenerate any Forgotten Strong Complex Password, 1st Research Student Workshop is an IEEE associated event, University of Glamorgan
  4. Fragkos G., 2007, Notional Understanding of Malicious Computer Network Activity based on Digital Footprints, 2st Research Student Workshop is an IEEE associated event, University of Glamorgan
  5. Fragkos G., Blyth A., 2007, Corporate Data Loss at Thirty Thousand Feet, 6th European Conference on Information Warfare and Security, Defence College of Management and Technology, Shrivenham, UK
  6. Fragkos, G. and Tryfonas, T. (2007), “A Cognitive Model for the Forensic Recovery of End-User Passwords”, in Preneel, B. et al. (Eds.), WDFIA 2007, Proceedings of the Second International Annual Workshop on Digital Forensics and Incident Analysis, University of the Aegean, Samos, Greece, IEEE Computer Society, pp. 48-54.
  7. Owen P (2007). Forensic Analysis of Ubiquitous Data. First Research Workshop, University of Glamorgan.
  8. Read, H. and Blyth, A., 2007, “Risk Management – Visual IDS Countermeasures”, BT Technology Journal, Vol 25, No. 1, January 2007.
  9. Read, H., Blyth, A. and Tryfonas, T. (2007), “IDS Data Visualisation: Potential and Challenges for Comprehensive Security Incident Analysis”, ENISA Quarterly, Vol. 3, No. 2, Apr-Jun 2007, pp. 5-7.
  10. Thomas, P. and Tryfonas, T. (2007), “ Hard-drive Disposal and Identity Fraud”, in IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R., (Boston: Springer), paper at the Security and Control of Identity in Society Workshop (SCITS 4), IFIP/SEC 2007, Johannesburg, South Africa, pp. 461-466.
  11. Tryfonas T. (2007), “On Security Metaphors and how they Shape the Emerging Practice of Secure Information Systems Development”, Journal of Information System Security (JISSec), Vol. 3 No 3, pp. 21-51.
  12. Tryfonas T. (2007), “An Alternative Model for Information Availability: Specifying the Intentions of DoS Attackers”. In Proceedings of the Fourth International NATO Scientific Conference on Security and Protection of Information, SPI 2007, University of Defence, Brno, Czech Republic, pp. 121-127.
  13. Tryfonas T., Sutherland I., Pompogiatzis I. (2007) Employing Penetration Testing as an Audit Methodology for the Security Review of VoIP: Tests and Examples, Internet Research, Volume 17, Issue 1.
  14. Tryfonas, T., Owen, P. and Thomas, P. (2007), “Malicious software and system damages: Is there a case for liability of software vendors?”, in Remenyi, D. (Ed.), ECIW 2007, Proceedings of the Sixth European Conference on Information Warfare and Security, Defence College of Management and Technology, Shrivenham, United Kingdom, pp. 281-290.

2006


  1. Angelopoulou, O., Thomas, P., Xynos, K. and Tryfonas, T. (2006), “On-line ID theft techniques, investigation and response”, in Jahankhani, H. et al. (Eds.), ICGeS 2006, Proceedings of the 2nd International Conference on Global eSecurity, pp. 156-163
  2. Blyth AJC, Computer Network Operations (CNO), Handbook of Information Security (Volume 2): Information Warfare; Social, Legal, and Intentaional Issues; and Security Foundations, Bidgoli (Ed.), Wiley, 2006, ISBN 0-471-648310-0.
  3. Blyth AJC and Thomas P, 2006, Performing Real-Time Threat Assessment of Security Incidents Using Data Fusion of IDS Logs, Journal of Computer Security, Vol 14, No 6.
  4. Fragkos G., Xynos K., Angelopoulou O., Mee V., 2006, An empirical methodology derived from the analysis of information remaining on second hand hard disks, European Conference on Computer Network Defence, University of Glamorgan
  5. Hargreaves C., Chivers H., Sutherland I. (2006) A PDA Based Live Forensic Tool. 1st Conference on Advances in Information Security and forensics.
  6. Jones A, Valli C, Sutherland I and Thomas P, 2006, The 2006 Analysis if Information Remaining on Disks Offered for Sale on the Second Hand Market, Journal of Digital Forensics, Security and Law, Vol. 1(3) 23
  7. Mee V., Tryfonas T., Sutherland I. (2006) The Windows Registry as a Forensic Artefact: Illustrating evidence collection for Internet usage, Digital Investigation, Volume 3 Issue 3 pages 166-173
  8. Mee, V., Tryfonas, T., Sutherland, I. (2006) Internet Activity in the Registry”, The International Journal of Digital Forensics and Incident Response, (September 2006 Edition), Elsevier publications
  9. Mulley, G.P.C, “A report on the progress of GNU Modula-2 and its potential integration into GCC ”, GCC Developers’ Summit , Ottawa Canada, June 28th-30th 2006
  10. Mulley, G.P.C, “The design of a free CSN API Model”, Proceedings of the European Modelling Symposium, UCL, Ed John Pollard, ISBN 0-9516509-3-9/978-0-9516509-3-6, September 2006.
  11. Pilgermann M, Blyth AJC and Vidalis S., Inter-Organisational Intrusion Detection using Knowledge Grid Technology, Journal of Information Management and Computer Security, Vol 14, No. 4, 2006.
  12. Pompogiatzis I.,Tryfonas T., Sutherland I. (2006) An Audit Methodology for the Security Review of VoIP, 6th International Network Conference, Plymouth 2006, UK.
  13. Read H, Blyth A, 2006, “An Integrated Visualisation Framework for Intrusion Detection”, Proceedings of the 7th IEEE Workshop in Information Assurance, U.S. Military Academy, West Point, NY, ISBN: 1-4244-0130-5
  14. Sutherland I., Kalb G. and Blyth A. (2006) An Empirical Examination of the Reverse Engineering Process for Binary Files. Computers and Security, Volume 25, Issue 3, Page 155-236 (May 2006)
  15. Sutherland I. and Mee V. (2006) Data Disposal: How educated are your Schools?, 6th European Conference on Information Warfare and Security, June 2006.
  16. Sutherland I, Thomas P, A Classification System for Adult Pornographic Material downloaded from the Internet, Journal for Information Assurance Professionals Information Security Bulletin, July 2006
  17. Tryfonas T, Thomas P and Owen P, ID Theft: Fraudsters’ techniques for Personal Data Collection, the Related digital Evidence and Investigation Issues, Information Systems Control Journal, Vol 1, JONLINE, 2006.
  18. Vidalis S, Pilgermann P, Morakis E, and Blyth AJC, Security in Hetergenious Large Scale Environments using GRID Technology, International Journal of Innovative Computing, Information and Control (IJICIC), Vol 2, No. 2, 2006.

2005


  1. Avourdiadis A and Blyth AJC, Normalising Events into Incisdents Using Unified Intrusion Detection-Related Data, Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), Springer, 2005, ISBN 1-84628-311-6.
  2. Avourdiadis N, Blyth AJC, Thomas P, SoapSy – Unifying Security Data from Various Heterogeneous Distributed Systems into a Single Database Architecture, Journal of Information Systems Security, Vol 2 2005
  3. Blyth AJC and Thomas P, An XML-Based Architecture for Data Integration in Vulnerability Assessments, Journal of Information Management and Computer Security, Vol 13, No 4, 2005.
  4. Fragkos G., Blyth A., 2005, Architecture for Near Real-Time Threat Assessment using IDS Data, 4th European Conference on Information Warfare and Security, University of Glamorgan

  5. Fragkos G., Blyth A., 2005, Security Threat Assessment across large network infrastructures, Safeguarding National Infrastructures: Integrated Approaches to Failure in Complex Networks, University of Glasgow
  6. Fragkos G., Xynos K., Blyth A., 2005, The use of computers idle-time and parallel processing over a network to perform password threat assessment, 4th European Conference on Information Warfare and Security, University of Glamorgan
  7. Iheagwara, C., Blyth, A., and Bennett, M. 2005. Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation. In Proceedings of the 2005 Systems Communications (Icw’05, Ichsn’05, Icmcs’05, Senet’05) – Volume 00 (August 14 – 17, 2005). ICW. IEEE Computer Society, Washington, DC, 434-441. DOI= http://dx.doi.org/10.1109/ICW.2005.29
  8. Jones, A., Meyler, C., Mee, V., Gooch, J., “Analysis of Data Recovered from computer disks released for resale by organisations”, Journal of Information Warefare, Volume 4, Issue 2 (September 2005)
  9. Mee, V., Jones, A., “The Windows Operating System Registry – A Central Repository of Evidence”, E-crime and Computer Evidence 2006 Conference Proceedings, Monte Carlo, Monaco (March 2005)
  10. Mee,V., Jones, A., “Event Logs and their Forensic Usefulness”, European Conference on Internet Warfare 2005, University of Glamorgan, UK (June 2005)
  11. Mee V., Sutherland I. (2005) Windows Event Logs and their Forensic Usefulness. 5th European Conference on Information Warfare and Security, July 2005.
  12. Meyler C. and Sutherland I. (2005) A flexible Open Source architecture for Network-based Forensic Computing and Intelligence Gathering Tools. 1st European Conference on Computer Network Defence, p253-
    262, December 2005.
  13. Mulley, G.P.C, and Lemberg, W., “ Extending GNU Troff to produce HTML through the technique of next event simulation”, International Journal of Simulation Systems, Science and Technology, Volume 6(7-8) , The United Kingdom Simulation Society, ISSN 1473-804x online, 1473-8031 print, June 2005
  14. Oyegoke EE, Tryfonas T and Blyth AJC, Exploring Vulnerabilities of Agent-based IDS: The Need for Agent Self-Defence, Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), Springer, 2005, ISBN 1-84628-311-6.
  15. Pilgermann M., Vidalis S., Morakis E., Blyth A. (2005) Security in Heterogeneous Large Scale Environments Using GRID Technology International, Journal for Innovative Computing, Information and Control (IJICIC), Volume 1, Number 4, December 2005; ISSN 1349-4198
  16. Read H, Blyth A, “Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data”, Proceedings of the 4th European Conference on Information Warfare and Security
  17. Thomas P and Tryfonas T, An Interpretive field Study of Competitive Intelligence in Software Development, Journal of Competitive Intelligence and Management, Vol 3, No 3, Winter 2005
  18. Thomas P, An Analysis of the Effect of Security Measures on Wireless Network Performance, Journal for Information Assurance Professionals, Information Security Bulletin, May 2005
  19. Tryfonas T., Sutherland I., Thomas P. and Mee V. (2005) Distribution of Offensive Material in Information Technology Networks: A Discussion on Opportunities for Offenders and Protection. 5th European Conference on Information Warfare and Security, July 2005.
  20. Vidalis S., Pilgermann M., Morakis E., Blyth A. (2005) GRID for Digital Security (G4DS), Journal of Maintenance Problems, 2(56), October 2005, ISSN 1232-9312

2004

  1. Iheagwara C and Blyth AJC, Cost Effective Management Frameworks: The Impact of IDS Deployment Technique on Threat Mitigation, Journal of Information and Software Technology, Vol. 46, No 10, pp 651-664, 2004
  2. Iheagwara C, Blyth AJC and Singhal M, Cost Effective Management Frameworks for Intrusion Detection Systems, Journal of Computer Security, Vol 12, No. 5, IOS Press, pp. 777-798, 2004
  3. Jones, A., Meyler, C., Mee, V., Gooch, J., “Recovering the Unrecoverable”, Computer and Internet Crime 2004, London, UK (Sept 2004)
  4. Mee,V., Jones, A., “The Windows Registry”, 5th Australian Information Warfare Conference Proceedings 2004, Edith Cowan University (November 2004)
  5. Mulley, G.P.C, ”Using Ismene to Debug and Predict the Performance of an Embedded System Device Driver ”, International Journal of Simulation Systems, Science and Technology , Volume 5(3-4) , The United Kingdom Simulation Society, ISSN 1473-804x Online, ISSN 1473-8031 Print, September 2004
  6. Pilgermann M. and Blyth A. (2004) Anonymizing data in a Peer-To-Peer based Distributed Intrusion Detection System Proc. of the 3rd European Conference on Information Warfare and Security, 2004
  7. Vidalis S, Jones A, Blyth A and Thomas P, Assessing Cyber Threats in the Information Environment, Journal of Network Security, 2004 Vol 11, p10-11, 2004

2003

  1. Blyth AJC, An XML-Based Architecture to Perform Data Integration and Data Unification in Vulnerability Assessments, Technical Notes in Information Security, Vol. 8 No 4, 2003.
  2. Blyth AJC, Cunliffe D and Sutherland I, Security Analysis of XML Usage and XML Parsing, Computers and Security, Vol. 22, No 6, 2003, pp 494-505, ISSN: 0167-4048.
  3. Blyth AJC, Using Business Models for Threat Analysis in an Information Operations Environment, 2nd European Conference on Information Warfare and Security, Reading University, UK, 2003, ISBN: 0-9544577-0-6.
  4. Iheagwara C, Blyth AJC and Singhal M, A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment, Journal of Computer Security, Volume 11, No.1, 2003, pp 1-33, 2003, ISSN: 0926-227-X.
  5. Iheagwara C, Blyth AJC and Singhal M, Cost Effective Management Frameworks for Intrusion Detection Systems, Journal of Computer Security, Volume 11, No.3, 2003, ISSN: 0926-227-X
  6. Iheagwara C. and Blyth AJC, Future Directions in the Development of Intrusion Detection Systems, The Information Systems Control Journal, May, 2003.
  7. Iheagwara C. and Blyth AJC, Intrusion Detection Challenges: Charting the Course for Research and Development, Proceeding of the International Conference on Industrial Engineering and Engineering Management (IE&EM’2003), Shanghai, China, December 6-8 2003.
  8. Iheagwara C. and Blyth AJC, Security Problems and the Interaction of Security Policies in the Design and Implementation of IDS in Enterprise Networks, Proceedings of the FIRST 15th Annual Computer Security Incident Handling Conference, Ottawa Ontario, Canada, June 22-27, 2003
  9. Iheagwara C. and Blyth AJC, The Impact of IDS Deployment Technique on Threat Mitigation, Proceeding of the International Conference on Industrial Engineering and Engineering Management (IE&EM’2003), Shanghai, China, December 6-8 2003
  10. Jones A and Sutherland I, Threats to Information Systems and the way we deal with them, Information Security Bulletin, Volume 8, Issue 4, 2003
  11. Jones A, A Methodology for the Assessment of the Capability of Threat Agents in an Information Environment, A Jones, Journal of Information Warfare, Volume 2, Issue 2, 2003, ISSN 1445-3312
  12. Jones A, Re-Interpreting Information Operations in the Private Sector, 2nd European Conference on Information Warfare and Security, Reading University, UK, 2003, ISBN 0-9544577-0-6
  13. Meyler C and Sutherland I, A Generic Set of Requirements for Open Source Computer Forensic and Intelligence Gathering Tools, 2nd European Conference on Information Warfare, Reading, UK, 2003, ISBN: 0-9544577-0-6.
  14. Morakis E and Blyth A, Measuring Vulnerabilities and their Exploitation Cycle, Elsevier Information Security Technical Report, Vol. 8, No. 4, December, 2003.

  15. Morakis E, Vidalis S and Blyth AJC, A Framework for Representing and analyzing Cyber Attacks using Object Oriented Hierarchy Tress, 2nd European Conference on Information Warfare and Security, Reading University, UK, 2003, ISBN: 0-9544577-0-6.

  16. Vidalis S and Jones A, Using Vulnerability Trees for Decision Making in Threat Assessment, 2003

  17. Vidalis S and Jones A , School of Computing Technical Report CS-03-2, 2003

  18. Vidalis S and Jones A, Using Vulnerability Trees for Decision Making in Threat Assessment, 2nd European Conference on Information Warfare and Security, 2003,ISBN 0-9544577-0-6

2002

  1. Blyth AJC, Sutherland I and Cunliffe D, XEON – An Architecture for an XML Enabled Firewall, 4th International Conference On Enterprise Information Systems, Universidad de Castilha-La Mancha – Ciudad Real – Spain – 3-6 April, 2002

  2. Iheagwara C. and Blyth AJC, Evaluation of the Performance of IS Systems in a Switched and Distributed Environment: The RealSecure Case Study, Computer Networks, Vol. 39, No 2, April 2002, pp 93-112, ISSN: 1389-1286

  3. Iheagwara. and Blyth AJC, The Impact of Security Layering on end-to-end latency and system performance in switched and distributed e-business environments, Computer Networks, Vol. 39, No 5, 2002, pp 827-840, ISSN 1389-1286.

  4. Jones A, Protecting the Critical National Infrastructure – Development of a Method for the Measurement of Threat Agents in an Information Environment, Information Security Technical Report, Volume 7, Issue 2, Elsevier, 2002, ISSN 1363- 412.

  5. Jones, Kovacich and Luzwick, Global Information Warfare, 2002, Auerbach, ISBN 0-9493-1114-4.
    Vidalis S and Blyth AJC, “TAME: A Threat Assessment Model for the METEORE System”, eBusiness and eWork 2002, Prague, October 2002.

  6. Vidalis S and Blyth AJC, “TAME: A Threat Assessment Model for the METEORE System”, University of Glamorgan, SoC-Technical Report-CS-02-5, October 2002.

  7. Vidalis S and Blyth AJC, “Understanding & Developing a Threat Assessment Model”, University of Glamorgan, SoC-Technical Report-CS-02-3, November 2002.

  8. Vidalis S and Blyth AJC, Understanding and Developing a Threat Assessment Model, 1st European Conference on Information Warfare and Security, Brunel University, UK, 2002, ISBN: 0-9540488-4-9


2001

  1. Blyth AJC and Kovacich GL, Information Assurance: Surviving in the Information Environment, Springer, 2001, ISBN 1-85233-326-X.

  2. Blyth AJC, Information Assurance in the Age of Information Warfare, 15th Annual Vanguard Enterprise Security Conference, Reno, NV, USA

  3. Embury SM, Brandt SM, Robinson J, Sutherland I, Bisby FA, Gray A, Jones AC, and White RJ, Adapting Integrity Enforcement techniques for Data Reconciliation. Information Systems, Vol 26, 2001, p657-689.

  4. Jones A and Kovacich J, What InfoSec Professionals Should Know About Information Warfare Tactics By Terrorists – Part 1, Computers & Security, Volume 21, Number 1, Elsevier,2001.

  5. Jones A and Kovacich J, What InfoSec Professionals Should Know About Information Warfare Tactics By Terrorists – Part 2, Jones and Kovacich. Computers & Security, Volume 21, Number 2, Elsevier, 2001, ISSN 0167-4048

2000


  1. Blyth AJC and Beynon-Davies P, IS Failure, Trust and Electronic Commerce, 5th Annual Conference of the UKAIS, 26th – 28th April 2000, Cardiff, UK

  2. Blyth AJC, Detecting Intrusions, UKERNA Computer Security – Protecting Computers Conference, 22nd November 2000, Royal Geographical Society, UK

  3. Jones AC, Sutherland I, Embury SM, Gray WA, White RJ, Robinson JS, Bisby FA and Brandt SM, Techniques for Effective Integration, Maintenance and Evolution of Species Databases, in Proceedings of the 12th International Conference on Scientific and Statistical Database Management, Günther O and Lenz HJ (eds.), Berlin, July, IEEE Computer Society Press, pp. 3-13, 2000.

  4. Sutherland I, Robinson J, Brandt SM, Jones AC, Embury SM, Gray WA, White RJ and Bisby FA, Assisting the Integration of Taxonomic Data: The Litchi Toolkit, Sixteenth International Conference on Data Engineering, pp.679-680, 2000.