ISRG Banner

Publications


Below you will find a list of publications and conference presentations to date for the University of South Wales Information Security Research Group. Our team comprises of both full-time Lecturing and PhD colleagues. 

  • Davies, G. & Smith, K. (2019), The Feasibility of Creating a Universal Digital Forensics Framework. Forensic, Legal & Investigative Sciences. 5. 1-9. 10.24966/FLIS-733X/100027. 
  • Davies, G. (2019), Bypassing vehicle infotainment security, Paper presentation at BSides Cymru 2019, Cardiff
  • Davies, R., Miknis, M. & Johnson, C. (2019), Improving the Learner Lifecycle through Technology Paper presented at HEA STEM Conference 2019, Birmingham, United Kingdom, 30/01/19 - 31/01/19.
  • Davies, R. & Whitter-Jones, J. (2019), Interactive environment for learning programming, Paper presented at HEA STEM Conference 2019, Birmingham, United Kingdom, 30/01/19 - 31/01/19, APA.
  • Johnson, C. (2019). University of South Wales national cyber security academy – creating cyber graduates who can ‘hit the ground running’: an innovative project based approach. Higher Education Pedagogies, Taylor & Francis, Available at:  https://doi.org/10.1080/23752696.2019.1605837
  • Johnson, A., Davies, R., (2019). Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods, in: 2019 7th International Symposium on Digital Forensics and Security (ISDFS) 10-12 June 2019., Published 11th July 2019 IEEE, pp. 1–6. doi:10.1109/ISDFS.2019.8757547 Link: https://ieeexplore.ieee.org/document/8757547
  • Johnson, C. & Davies, R. (2019), Using forensic techniques to identify contract cheating: A case study, Paper presented at Plagiarism across Europe and Beyond (accepted for publication), Vilnius, Lithuania, 19/06/19 - 21/06/19.
  • Perera, A. (2019), Experience of Phishing in W(h)ales, Paper presentation at BSides Cymru 2019, Cardiff
  • Whitter-Jones, J. (2019), Security Operations - Technology and Architecture, Infosecurity Magazine, Available at: https://www.infosecurity-magazine.com/next-gen-infosec/security-operations-technology

  • Whitter-Jones, J. (2019), Security Operations - The Human Element, Infosecurity Magazine, Available at: https://www.infosecurity-magazine.com/next-gen-infosec/security-operations-technology
  • Davies, R., Wilson, I. & Ware, J. (2018), Stereoscopic Human Detection in a Natural Environment, Annals of Emerging Technologies in Computing, vol 2, no. 2, pp. 15.
  • Davies, G. (2018), Cloud Data Forensics: UK Best Practice, Paper presented at College of Policing and The Investigator National Digital Media Investigator’s (DMI) Conference 2018, Towcester, United Kingdom, 21/11/18 - 22/11/18. 
  • Johnson, C. & Reddy, M. (2018) The Student Voice, What We Know About the Students’ Perspective of Academic Integrity, Towards consistency and transparency in academic integrity. Razı, S., Glendinnig, I. & Foltýnek, T. (eds.). Berlin: Peter Lang, p. 17-31(book chapter), Available at: https://www.peterlang.com/abstract/9783631781593/xhtml/fm_cover.xhtml
  • Johnson, C. (2018), University of South Wales is closing the Skills Gap, Available at: https://www.computing.co.uk/ctg/news/3062542/university-of-south-wales-is-closing-the-skills-gap-say-it-professionals
  • Burnap, P., Cherdantseva, Y., Blyth, A., Eden, P., Jones, K., Soulsby, H. & Stoddart, K. (2017), Determining and Sharing Risk Data in Distributed Interdependent Systems, Computer, vol 50, no. 4, pp. 72-79. DOI: 10.1109/MC.2017.108
  • Davies, G. (2017),'Cyber investigations: digital forensics & automobile electronics II, Paper presented at 3rd International Conference and Exhibition on Automobile Engineering, Berlin, Germany, 28/09/17 - 29/09/17.
  • Eden, P., Blyth, A., Jones, K., Soulsby, H., Cherdantseva, Y., Burnap, P. & Stoddart, K. (2017), SCADA System Forensic Analysis Within IIoT. in L Thames & D Schaefer (eds), Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing. 1st edn, Springer Series in Advanced Manufacturing , Springer Nature, pp. 73-101. DOI: 10.1007/978-3-319-50660-9_4
  • Johnson, C. (2017), Collaborative technologies, higher order thinking and self-sufficient learning: A case study of adult learners, In : Alt J Research in Learning Technology. 25, 17 p., 1981, Available at: https://doi.org/10.25304/rlt.v25.1981
  • Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. & Stoddart, K. (2016), A review of cyber security risk assessment methods for SCADA systems, Computers and Security, vol 56, pp. 1-27. DOI: 10.1016/j.cose.2015.09.009
  • Davies, G. (2016), Cyber forensics & automobile electronics, Paper presented at 2nd International Conference and Exhibition on Automobile Engineering, December 01-02, 2016 Valencia, Spain, Theme: Exploring Advances in Automobile Engineering, 1/12/16, . DOI: 10.4172/2167-7670.C1.004
  • Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. & Stoddart, K. (2016), Forensic Readiness for SCADA/ICS Incident Response. in Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016. ICS-CSR '16, BCS Learning Development Ltd., Swindon, UK, pp. 1-9, 4th International Symposium for ICS & SCADA Cyber Security Research 2016, Belfast, United Kingdom, 23/08/16. DOI: 10.14236/ewic/ICS2016.16
  • Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. & Stoddart, K. (2016), A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure. in E Rome, M Theocharidou & S Wolthusen (eds), Critical Information Infrastructures Security: 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers., Chapter 3, Lecture Notes in Computer Science, vol. 9578, SPRINGER-VERLAG LONDON LTD, pp. 27-39. DOI: 10.1007/978-3-319-33331-1_3
  • Miknis, M., Ware, J., Davies, R. & Plassmann, P. (2016), Efficient Point Cloud Pre-processing using The Point Cloud Library, International Journal of Image Processing, vol 10, no. 2, pp. 63-72.
  • Moos, J., Davies, G., Lewis, E., Williams, N., Gichohi, B., Lane, R. & Bellamy, A. (2016), Digital Forensics for Automobile Systems: The Challenges and a Call to Arms, Forensic Science International, vol 1, no. 1. https://medwinpublishers.com/IJFSC/IJFSC16000101.php?id=25
  • Akarawita, I.U., Perera Kotte Liyanage, A. & Atukorale, A. (2015), ANDROPHSY–Forensic Framework for Android. in 15th International Conference on Advances in ICT for Emerging Regions (ICTer2015): Conference Proceedings 24th and 25th of August 2015, BMISCH, Colombo, SRI Lanka . Institute of Electrical and Electronics Engineers, pp. 250-258, 2015 Fifteenth International Conference on Advances in ICT for Emerging Regions , Colombo, Sri Lanka, 24/08/15. DOI: 10.1109/ICTER.2015.7377696
  • Davies, R., Wilson, I. & Ware, A. (2015), Stereoscopic Disparity Generation Reduction using a Dilated Laplacian Approach. in P Liatsis, A Uus & S Miah (eds), 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015). International Conference on Systems Signal and Image Processing, Publ by IEEE, pp. 101-104, 22nd International Conference on Systems, Signals and Image Processing (IWSSIP), London, 10/09/15. DOI: 10.1109/IWSSIP.2015.7314187
  • Eden, P., Blyth, A., Burnap, P., Cherdantseva, Y., Jones, K., Soulsby, H. & Stoddart, K. (2015), A Forensic Taxonomy of SCADA Systems and Approach to Incident Response. in Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015. ICS-CSR '15, BCS Learning Development Ltd., Swindon, UK, pp. 42-51, 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, Ingolstadt, Germany, 17/09/15. DOI: 10.14236/ewic/ICS2015.5
  • Miknis, M., Davies, R., Plassmann, .P. & Ware, A. (2015), Near real-time point cloud processing using the PCL. in P Liatsis, A Uus & S Miah (eds), 2015 INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2015). International Conference on Systems Signal and Image Processing, Publ by IEEE, pp. 153-156, 22nd International Conference on Systems, Signals and Image Processing (IWSSIP), London, 10/09/15. DOI: 10.1109/IWSSIP.2015.7314200
  • Davies, G. (2014), 'Hardware Forensics' Paper presented at Security Forum 2014, Austria, 9/04/14 - 10/04/14
  • Davies, G. (2013), Manipulation of hard drive firmware to conceal entire partitions, Digital Investigation. 
  • Wilson, I., Davies, R. & Stanton, N. (2013), A Genetic Algorithm based solution to the Teaching Assignment Problem, International Journal of Computer Applications, vol 81, no. 19, pp. 1-6. DOI: 10.5120/14268-0056
  • Blyth, A., Sutherland, I. & Davies, G. (2011), Malware and Steganography in Hard Disk Firmware, Journal in Computer Virology, vol 7, no. 3, pp. 215 - 219. DOI: 10.1007/s11416-010-0149-x
  • Sutherland, I. & Davies, G. (2010), Hard Disk Storage: Data Leakage. in J Demergis (ed.), Proceedings of the 9th European Conference on Information Warfare and Security: Hosted by strategy international.org and the Department of Applied Informatics; University of Macedonia, Thessaloniki, Greece, 1-2 July 2010. 9th European Conference on Information Warfare and Security, 1/02/10.
  • Sutherland, I. & Davies, G. (2010), Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice. in Annual ADFSL Conference on Digital Forensics, Security and Law: St. Paul, Minnesota, May 19-21, 2010 . Scholarly Comms, The 2010 ADFSL Conference on Digital Forensics, Security and Law , 19/05/10.
  • Sutherland, I. & Davies, G. (2010), Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice. in Annual ADFSL Conference on Digital Forensics, Security and Law: St. Paul, Minnesota, May 19-21, 2010 . Scholarly Comms, The 2010 ADFSL Conference on Digital Forensics, Security and Law , 19/05/10.
  • Sutherland, I., Jones, A., Davies, G., Dardick, G., Valli, C. & Dabibi, G. (2010), The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. in Proceedings of the 8th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, November 30th 2010. 8th Australian Digital Forensics Conference , 28/11/10.
  • Xynos, K., Blyth, A., Sutherland, I., Harries, S. & Davies, G. (2010), Xbox 360: a digital forensic investigation of the hard disk drive, Digital Investigation, vol 6, no. 3-4, pp. 104 - 111. DOI: 10.1016/j.diin.2010.02.004
  • Blyth, A., Sutherland, I., Davies, G. & Pringle, P. (2009), The Impact of Hard Disk Firmware Steganography on Computer Forensics, Journal of Digital Forensics, Security and Law, vol 4, no. 2.
  • Davies, G. (2009), The 2008 analysis of information remaining on disks offered for sale on the second hand market, Journal of Digital Forensics, Security and Law.