Követés
Konstantinos Xynos
Konstantinos Xynos
Ismeretlen szervezet
E-mail megerősítve itt: mycenx.com - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Welcome pwn: Almond smart home hub forensics
A Awasthi, HOL Read, K Xynos, I Sutherland
Digital Investigation 26, S38-S46, 2018
422018
Forensic analysis of smart TV: A current issue and call to arms
I Sutherland, H Read, K Xynos
Digital Investigation 11 (3), 175-178, 2014
362014
Penetration testing and vulnerability assessments: A professional approach
K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth
School of Computer and Information Science, Security Research Centre, Edith …, 2010
362010
Forensic analysis of a Sony PlayStation 4: A first look
M Davies, H Read, K Xynos, I Sutherland
Digital Investigation 12, S81-S89, 2015
342015
Xbox 360: A digital forensic investigation of the hard disk drive
K Xynos, S Harries, I Sutherland, G Davies, A Blyth
Digital Investigation 6 (3), 104-111, 2010
212010
Forensic Analysis of the Nintendo 3DS NAND
G Pessolano, HOL Read, I Sutherland, K Xynos
Digital Investigation 29, S61-S70, 2019
162019
A forensic overview of the LG Smart TV
I Sutherland, K Xynos, H Read, A Jones, T Drange
122014
Effectiveness of Blocking Evasions in Intrusion Prevention System
K Xynos, I Sutherland, A Blyth
University of South Wales, 1-6, 2013
122013
Presenting devise: data exchange for visualizing security events
H Read, K Xynos, A Blyth
IEEE computer graphics and applications, 6-11, 2009
122009
A forensic methodology for analyzing Nintendo 3DS devices
H Read, E Thomas, I Sutherland, K Xynos, M Burgess
IFIP International Conference on Digital Forensics, 127-143, 2016
112016
Forensic Evaluation of an Amazon Fire TV Stick
L Morrison, H Read, K Xynos, I Sutherland
IFIP International Conference on Digital Forensics, 63-79, 2017
102017
Manipulation of hard drive firmware to conceal entire partitions
H Read, K Xynos, I Sutherland, G Davies, T Houiellebecq, F Roarson, ...
Digital Investigation 10 (4), 281-286, 2013
102013
Network Forensic Investigation of Internal Misuse/Crime in Saudi Arabia: A Hacking Case
A Al-Murjan, K Xynos
Proceedings of the Conference on Digital Forensics, Security and Law, 15-32, 2008
10*2008
Online ID theft techniques, investigation and response
O Angelopoulou, P Thomas, K Xynos, T Tryfonas
International Journal of Electronic Security and Digital Forensics 1 (1), 76-88, 2007
92007
The impact of changing technology on international cybersecurity curricula
H Read, I Sutherland, K Xynos, T Drange, E Sundt
International Conference on Human Aspects of Information Security, Privacy …, 2017
82017
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems
H Read, I Sutherland, K Xynos, F Roarson
Information Security Journal: A Global Perspective, 1-9, 2015
62015
Penetration Testing and Vulnerability Assessments: A Professional Approach
X Konstantinos, S Iain, R Huw, E Emlyn, JC Andrew
pub. in Proceedings of the 1st International Cyber Resilience Conference …, 2010
42010
An Analysis of the Prevalence of Game Consoles in Criminal Investigations in the United Kingdom
I Sutherland, H Read, K Xynos
European Conference on Cyber Warfare and Security 21 (1), 289-295, 2022
32022
On the Development of Automated Forensic Analysis Methods for Mobile Devices
P Andriotis, T Tryfonas, G Oikonomou, S Li, Z Tzermias, K Xynos, H Read, ...
Trust and Trustworthy Computing, 212-213, 2014
32014
Antivirus False-Positive Alerts, Evading Malware Detection, and Cyber-security Issues
G Fragkos, O Angelopoulou, K Xynos
Journal of Information Warfare 12 (3), 26-40, 2013
32013
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20