Welcome pwn: Almond smart home hub forensics A Awasthi, HOL Read, K Xynos, I Sutherland Digital Investigation 26, S38-S46, 2018 | 42 | 2018 |
Forensic analysis of smart TV: A current issue and call to arms I Sutherland, H Read, K Xynos Digital Investigation 11 (3), 175-178, 2014 | 36 | 2014 |
Penetration testing and vulnerability assessments: A professional approach K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth School of Computer and Information Science, Security Research Centre, Edith …, 2010 | 36 | 2010 |
Forensic analysis of a Sony PlayStation 4: A first look M Davies, H Read, K Xynos, I Sutherland Digital Investigation 12, S81-S89, 2015 | 34 | 2015 |
Xbox 360: A digital forensic investigation of the hard disk drive K Xynos, S Harries, I Sutherland, G Davies, A Blyth Digital Investigation 6 (3), 104-111, 2010 | 21 | 2010 |
Forensic Analysis of the Nintendo 3DS NAND G Pessolano, HOL Read, I Sutherland, K Xynos Digital Investigation 29, S61-S70, 2019 | 16 | 2019 |
A forensic overview of the LG Smart TV I Sutherland, K Xynos, H Read, A Jones, T Drange | 12 | 2014 |
Effectiveness of Blocking Evasions in Intrusion Prevention System K Xynos, I Sutherland, A Blyth University of South Wales, 1-6, 2013 | 12 | 2013 |
Presenting devise: data exchange for visualizing security events H Read, K Xynos, A Blyth IEEE computer graphics and applications, 6-11, 2009 | 12 | 2009 |
A forensic methodology for analyzing Nintendo 3DS devices H Read, E Thomas, I Sutherland, K Xynos, M Burgess IFIP International Conference on Digital Forensics, 127-143, 2016 | 11 | 2016 |
Forensic Evaluation of an Amazon Fire TV Stick L Morrison, H Read, K Xynos, I Sutherland IFIP International Conference on Digital Forensics, 63-79, 2017 | 10 | 2017 |
Manipulation of hard drive firmware to conceal entire partitions H Read, K Xynos, I Sutherland, G Davies, T Houiellebecq, F Roarson, ... Digital Investigation 10 (4), 281-286, 2013 | 10 | 2013 |
Network Forensic Investigation of Internal Misuse/Crime in Saudi Arabia: A Hacking Case A Al-Murjan, K Xynos Proceedings of the Conference on Digital Forensics, Security and Law, 15-32, 2008 | 10* | 2008 |
Online ID theft techniques, investigation and response O Angelopoulou, P Thomas, K Xynos, T Tryfonas International Journal of Electronic Security and Digital Forensics 1 (1), 76-88, 2007 | 9 | 2007 |
The impact of changing technology on international cybersecurity curricula H Read, I Sutherland, K Xynos, T Drange, E Sundt International Conference on Human Aspects of Information Security, Privacy …, 2017 | 8 | 2017 |
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems H Read, I Sutherland, K Xynos, F Roarson Information Security Journal: A Global Perspective, 1-9, 2015 | 6 | 2015 |
Penetration Testing and Vulnerability Assessments: A Professional Approach X Konstantinos, S Iain, R Huw, E Emlyn, JC Andrew pub. in Proceedings of the 1st International Cyber Resilience Conference …, 2010 | 4 | 2010 |
An Analysis of the Prevalence of Game Consoles in Criminal Investigations in the United Kingdom I Sutherland, H Read, K Xynos European Conference on Cyber Warfare and Security 21 (1), 289-295, 2022 | 3 | 2022 |
On the Development of Automated Forensic Analysis Methods for Mobile Devices P Andriotis, T Tryfonas, G Oikonomou, S Li, Z Tzermias, K Xynos, H Read, ... Trust and Trustworthy Computing, 212-213, 2014 | 3 | 2014 |
Antivirus False-Positive Alerts, Evading Malware Detection, and Cyber-security Issues G Fragkos, O Angelopoulou, K Xynos Journal of Information Warfare 12 (3), 26-40, 2013 | 3 | 2013 |