Isod fe welwch restr o gyhoeddiadau a chyflwyniadau cynhadledd hyd yma ar gyfer Grŵp Ymchwil Diogelwch Gwybodaeth Prifysgol De Cymru. Mae ein tîm yn cynnwys cydweithwyr Darlithio amser llawn a PhD.
Elmisery A.M., Sertovic M. (2020), Privacy Preserving Threat Hunting in Smart Home Environments. In: Anbar M., Abdullah N., Manickam S. (eds) Advances in Cyber Security. ACeS 2019. Communications in Computer and Information Science, vol 1132. Springer, Singapore. Available at: https://doi.org/10.1007/978-981-15-2693-0_8
Johnson, C. & Davies, R. (2020), Using digital forensic techniques to identify contract cheating: A case study, Journal of Academic Ethics, Springer. Available at: https://doi.org/10.1007/s10805-019-09358-w
Usman, M. (in press), A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework, IEEE Transactions on Industry Applications
Johnson, C. & Davies, R. (in press), Using digital forensic techniques to identify contract cheating: A case study, Journal of Academic Ethics, Accepted for publication
Davies, G. & Smith, K. (2019), The Feasibility of Creating a Universal Digital Forensics Framework. Forensic, Legal & Investigative Sciences. 5. 1-9. 10.24966/FLIS-733X/100027.
Davies, G. (2019), Bypassing vehicle infotainment security, Paper presentation at BSides Cymru 2019, Cardiff
Davies, R., Miknis, M. & Johnson, C. (2019), Improving the Learner Lifecycle through Technology Paper presented at HEA STEM Conference 2019, Birmingham, United Kingdom, 30/01/19 - 31/01/19.
Davies, R. & Whitter-Jones, J. (2019), Interactive environment for learning programming, Paper presented at HEA STEM Conference 2019, Birmingham, United Kingdom, 30/01/19 - 31/01/19, APA.
Johnson, C. (2019). University
of South Wales national cyber security academy – creating cyber
graduates who can ‘hit the ground running’: an innovative project based
approach. Higher Education Pedagogies, Taylor & Francis, Available at: https://doi.org/10.1080/23752696.2019.1605837
Johnson, A., Davies, R., (2019). Speculative
Execution Attack Methodologies (SEAM): An overview and component
modelling of Spectre, Meltdown and Foreshadow attack methods, in:
2019 7th International Symposium on Digital Forensics and Security
(ISDFS) 10-12 June 2019., Published 11th July 2019 IEEE, pp. 1–6.
doi:10.1109/ISDFS.2019.8757547 Link: https://ieeexplore.ieee.org/document/8757547
Johnson, C. & Davies, R. (2019), Using forensic techniques to identify contract cheating: A case study, Paper presented at Plagiarism across Europe and Beyond (accepted for publication), Vilnius, Lithuania, 19/06/19 - 21/06/19.
Perera, A. (2019), Experience of Phishing in W(h)ales, Paper presentation at BSides Cymru 2019, Cardiff
Davies, R., Wilson, I. & Ware, J. (2018), Stereoscopic Human Detection in a Natural Environment, Annals of Emerging Technologies in Computing, vol 2, no. 2, pp. 15.
Davies, G. (2018), Cloud Data Forensics: UK Best Practice,
Paper presented at College of Policing and The Investigator National
Digital Media Investigator’s (DMI) Conference 2018, Towcester, United
Kingdom, 21/11/18 - 22/11/18.
Johnson, C. & Reddy, M. (2018) The
Student Voice, What We Know About the Students’ Perspective of Academic
Integrity, Towards consistency and transparency in academic integrity. Razı, S., Glendinnig, I. & Foltýnek, T. (eds.). Berlin: Peter Lang, p. 17-31(book chapter), Available at: https://www.peterlang.com/abstract/9783631781593/xhtml/fm_cover.xhtml
Burnap, P., Cherdantseva, Y., Blyth, A., Eden, P., Jones, K., Soulsby, H. & Stoddart, K. (2017), Determining and Sharing Risk Data in Distributed Interdependent Systems, Computer, vol 50, no. 4, pp. 72-79. DOI: 10.1109/MC.2017.108
Davies,
G. (2017),'Cyber investigations: digital forensics & automobile
electronics II, Paper presented at 3rd International Conference and
Exhibition on Automobile Engineering, Berlin, Germany, 28/09/17 -
29/09/17.
Eden, P., Blyth, A., Jones, K., Soulsby, H., Cherdantseva, Y., Burnap, P. & Stoddart, K. (2017), SCADA System Forensic Analysis Within IIoT.
in L Thames & D Schaefer (eds), Cybersecurity for Industry 4.0:
Analysis for Design and Manufacturing. 1st edn, Springer Series in
Advanced Manufacturing , Springer Nature, pp. 73-101. DOI: 10.1007/978-3-319-50660-9_4
Johnson, C. (2017), Collaborative technologies, higher order thinking and self-sufficient learning: A case study of adult learners, In : Alt J Research in Learning Technology. 25, 17 p., 1981, Available at: https://doi.org/10.25304/rlt.v25.1981
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K.,
Soulsby, H. & Stoddart, K. (2016), A review of cyber security risk
assessment methods for SCADA systems, Computers and Security, vol 56,
pp. 1-27. DOI: 10.1016/j.cose.2015.09.009
Davies,
G. (2016), Cyber forensics & automobile electronics, Paper
presented at 2nd International Conference and Exhibition on Automobile
Engineering, December 01-02, 2016 Valencia, Spain, Theme: Exploring
Advances in Automobile Engineering, 1/12/16, . DOI:
10.4172/2167-7670.C1.004
Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. & Stoddart, K. (2016), Forensic Readiness for SCADA/ICS Incident Response.
in Proceedings of the 4th International Symposium for ICS & SCADA
Cyber Security Research 2016. ICS-CSR '16, BCS Learning Development
Ltd., Swindon, UK, pp. 1-9, 4th International Symposium for ICS &
SCADA Cyber Security Research 2016, Belfast, United Kingdom, 23/08/16. DOI: 10.14236/ewic/ICS2016.16
Eden,
P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H.
& Stoddart, K. (2016), A Cyber Forensic Taxonomy for SCADA Systems
in Critical Infrastructure. in E Rome, M Theocharidou & S Wolthusen
(eds), Critical Information Infrastructures Security: 10th International
Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised
Selected Papers., Chapter 3, Lecture Notes in Computer Science, vol.
9578, SPRINGER-VERLAG LONDON LTD, pp. 27-39. DOI: 10.1007/978-3-319-33331-1_3
Miknis,
M., Ware, J., Davies, R. & Plassmann, P. (2016), Efficient Point
Cloud Pre-processing using The Point Cloud Library, International
Journal of Image Processing, vol 10, no. 2, pp. 63-72.
Moos, J., Davies, G., Lewis, E., Williams, N., Gichohi, B., Lane, R. & Bellamy, A. (2016), Digital Forensics for Automobile Systems: The Challenges and a Call to Arms, Forensic Science International, vol 1, no. 1. https://medwinpublishers.com/IJFSC/IJFSC16000101.php?id=25
Akarawita, I.U., Perera Kotte Liyanage, A. & Atukorale, A. (2015), ANDROPHSY–Forensic Framework for Android.
in 15th International Conference on Advances in ICT for Emerging
Regions (ICTer2015): Conference Proceedings 24th and 25th of August
2015, BMISCH, Colombo, SRI Lanka . Institute of Electrical and
Electronics Engineers, pp. 250-258, 2015 Fifteenth International
Conference on Advances in ICT for Emerging Regions , Colombo, Sri Lanka,
24/08/15. DOI: 10.1109/ICTER.2015.7377696
Davies,
R., Wilson, I. & Ware, A. (2015), Stereoscopic Disparity Generation
Reduction using a Dilated Laplacian Approach. in P Liatsis, A Uus &
S Miah (eds), 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND
IMAGE PROCESSING (IWSSIP 2015). International Conference on Systems
Signal and Image Processing, Publ by IEEE, pp. 101-104, 22nd
International Conference on Systems, Signals and Image Processing
(IWSSIP), London, 10/09/15. DOI: 10.1109/IWSSIP.2015.7314187
Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. & Stoddart, K. (2015), A Forensic Taxonomy of SCADA Systems and Approach to Incident Response.
in Proceedings of the 3rd International Symposium for ICS & SCADA
Cyber Security Research 2015. ICS-CSR '15, BCS Learning Development
Ltd., Swindon, UK, pp. 42-51, 3rd International Symposium for ICS &
SCADA Cyber Security Research 2015, Ingolstadt, Germany, 17/09/15. DOI: 10.14236/ewic/ICS2015.5
Miknis, M., Davies, R., Plassmann, .P. & Ware, A. (2015), Near real-time point cloud processing using the PCL.
in P Liatsis, A Uus & S Miah (eds), 2015 INTERNATIONAL CONFERENCE
ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015). International
Conference on Systems Signal and Image Processing, Publ by IEEE, pp.
153-156, 22nd International Conference on Systems, Signals and Image
Processing (IWSSIP), London, 10/09/15. DOI: 10.1109/IWSSIP.2015.7314200
Davies, G. (2013), Manipulation of hard drive firmware to conceal entire partitions, Digital Investigation.
Wilson, I., Davies, R. & Stanton, N. (2013), A Genetic Algorithm based solution to the Teaching Assignment Problem, International Journal of Computer Applications, vol 81, no. 19, pp. 1-6. DOI: 10.5120/14268-0056
Blyth, A., Sutherland, I. & Davies, G. (2011), Malware and Steganography in Hard Disk Firmware, Journal in Computer Virology, vol 7, no. 3, pp. 215 - 219. DOI: 10.1007/s11416-010-0149-x
Sutherland, I. & Davies, G. (2010), Hard Disk Storage: Data Leakage.
in J Demergis (ed.), Proceedings of the 9th European Conference on
Information Warfare and Security: Hosted by strategy international.org
and the Department of Applied Informatics; University of Macedonia,
Thessaloniki, Greece, 1-2 July 2010. 9th European Conference on
Information Warfare and Security, 1/02/10.
Sutherland, I. & Davies, G. (2010), Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice.
in Annual ADFSL Conference on Digital Forensics, Security and Law: St.
Paul, Minnesota, May 19-21, 2010 . Scholarly Comms, The 2010 ADFSL
Conference on Digital Forensics, Security and Law , 19/05/10.
Sutherland, I. & Davies, G. (2010), Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice.
in Annual ADFSL Conference on Digital Forensics, Security and Law: St.
Paul, Minnesota, May 19-21, 2010 . Scholarly Comms, The 2010 ADFSL
Conference on Digital Forensics, Security and Law , 19/05/10.
Sutherland, I., Jones, A., Davies, G., Dardick, G., Valli, C. & Dabibi, G. (2010), The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market.
in Proceedings of the 8th Australian Digital Forensics Conference,
Edith Cowan University, Perth Western Australia, November 30th 2010. 8th
Australian Digital Forensics Conference , 28/11/10.
Xynos, K.,
Blyth, A., Sutherland, I., Harries, S. & Davies, G. (2010), Xbox
360: a digital forensic investigation of the hard disk drive, Digital
Investigation, vol 6, no. 3-4, pp. 104 - 111. DOI:
10.1016/j.diin.2010.02.004
Blyth, A., Sutherland, I., Davies, G. & Pringle, P. (2009), The Impact of Hard Disk Firmware Steganography on Computer Forensics, Journal of Digital Forensics, Security and Law, vol 4, no. 2.
Davies, G. (2009), The 2008 analysis of information remaining on disks offered for sale on the second hand market, Journal of Digital Forensics, Security and Law.