default search action
Andrew Blyth
Person information
- affiliation: University of South Wales, Treforest, UK
- affiliation: University of Newcastle Upon Tyne, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j28]Oteng Tabona, Andrew Blyth, Thabiso M. Maupong, Thabo Semong:
Forensic cloud environment: a solution for big data forensics. Int. J. Electron. Secur. Digit. Forensics 14(5): 513-533 (2022)
2010 – 2019
- 2017
- [j27]Pete Burnap, Yulia Cherdantseva, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
Determining and Sharing Risk Data in Distributed Interdependent Systems. Computer 50(4): 72-79 (2017) - 2016
- [j26]Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56: 1-27 (2016) - [j25]William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell:
In-The-Wild Residual Data Research and Privacy. J. Digit. Forensics Secur. Law 11(1): 7-36 (2016) - [c21]Andrew Blyth:
Responsibility Modelling and Its Application Trust Management. HCI (20) 2016: 114-127 - [c20]Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
Forensic Readiness for SCADA/ICS Incident Response. ICS-CSR 2016 - [i1]William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell:
In The Wild Residual Data Research and Privacy. CoRR abs/1610.03229 (2016) - 2015
- [c19]Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure. CRITIS 2015: 27-39 - [c18]Peter Eden, Andrew Blyth, Pete Burnap, Kevin Jones, Kristan Stoddart:
A Forensic Taxonomy of SCADA Systems and Approach to Incident Response. ICS-CSR 2015 - 2014
- [j24]Konstantinia Charitoudi, Andrew J. C. Blyth:
An Agent-Based Socio-Technical Approach to Impact Assessment for Cyber Defense. Inf. Secur. J. A Glob. Perspect. 23(4-6): 125-136 (2014) - [c17]Hannah Louise Davies, Andrew J. C. Blyth:
Determining the Value of Information Security Investments - A Decision Support System. KMIS 2014: 426-433 - [c16]Andrew Blyth:
Understanding Security Patterns for Socio-technical Systems via Responsibility Modelling. SOSE 2014: 417-421 - 2013
- [j23]Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth:
Manipulation of hard drive firmware to conceal entire partitions. Digit. Investig. 10(4): 281-286 (2013) - [c15]Konstantinia Charitoudi, Andrew J. C. Blyth:
An Agent-Based Socio-technical Approach to Impact Assessment for Cyber Defense. EIDWT 2013: 558-563 - [c14]Andrew J. C. Blyth:
Role Logic and its Application to the Analysis of Process Control Systems from the Socio - Technical System Perspective. ICS-CSR 2013 - 2011
- [j22]Iain Sutherland, Gareth Davies, Andrew Blyth:
Malware and steganography in hard disk firmware. J. Comput. Virol. 7(3): 215-219 (2011) - 2010
- [j21]Konstantinos Xynos, Simon Harries, Iain Sutherland, Gareth Davies, Andrew Blyth:
Xbox 360: A digital forensic investigation of the hard disk drive. Digit. Investig. 6(3-4): 104-111 (2010)
2000 – 2009
- 2009
- [j20]Huw Read, Konstantinos Xynos, Andrew Blyth:
Presenting DEViSE: Data Exchange for Visualizing Security Events. IEEE Computer Graphics and Applications 29(3): 6-11 (2009) - [j19]Andrew Blyth:
An Architecture for An XML Enabled Firewall. Int. J. Netw. Secur. 8(1): 31-36 (2009) - [j18]Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth:
The Impact of Hard Disk Firmware Steganography on Computer Forensics. J. Digit. Forensics Secur. Law 4(2): 73-84 (2009) - [c13]Huw Read, Andrew Blyth, Iain Sutherland:
A Unified Approach to Network Traffic and Network Security Visualisation. ICC 2009: 1-6 - 2006
- [b3]Andrew Blyth, Gerald L. Kovacich:
Information Assurance - Security in the Information Environment. Computer Communications and Networks, Springer 2006, ISBN 978-1-84628-266-9, pp. i-xv, 1-261 - [j17]Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley:
An empirical examination of the reverse engineering process for binary files. Comput. Secur. 25(3): 221-228 (2006) - [j16]Michael Pilgermann, Andrew Blyth, Stilianos Vidalis:
Inter-organisational intrusion detection using knowledge grid technology. Inf. Manag. Comput. Secur. 14(4): 327-342 (2006) - [j15]Andrew Blyth, Paula Thomas:
Performing real-time threat assessment of security incidents using data fusion of IDS logs. J. Comput. Secur. 14(6): 513-534 (2006) - 2005
- [j14]Andrew Blyth, Paula Thomas:
An XML-based architecture for data integration in vulnerability assessments. Inf. Manag. Comput. Security 13(4): 260-273 (2005) - [c12]Nikolaos Avourdiadis, Andrew Blyth:
Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment. ECIW 2005: 9-20 - [c11]Grigorios Fragkos, Andrew Blyth:
Architecture for Near Real-Time Threat Assessment Using IDS Data. ECIW 2005: 91-98 - [c10]Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth:
The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. ECIW 2005: 99-106 - [c9]Richard Hoad, Andrew Blyth:
Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection. ECIW 2005: 117-128 - [c8]Huw Read, Andrew Blyth:
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data. ECIW 2005: 281-292 - [c7]Charles Iheagwara, Andrew Blyth, Mike Bennett:
Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation. Systems Communications 2005: 434-441 - 2004
- [j13]Charles Iheagwara, Andrew Blyth, Timm Kevin, David Kinn:
Cost effective management frameworks: the impact of IDS deployment technique on threat mitigation. Inf. Softw. Technol. 46(10): 651-664 (2004) - [j12]Charles Iheagwara, Andrew Blyth, Mukesh Singhal:
Cost effective management frameworks for intrusion detection systems. J. Comput. Secur. 12(5): 777-798 (2004) - 2003
- [j11]Andrew Blyth, Daniel Cunliffe, Iain Sutherland:
Security analysis of XML usage and XML parsing. Comput. Secur. 22(6): 494-505 (2003) - [j10]Andrew Blyth:
An XML-based architecture to perform data integration and data unification in vulnerability assessments. Inf. Secur. Tech. Rep. 8(4): 14-25 (2003) - [j9]Evangelos Morakis, Stilianos Vidalis, Andrew Blyth:
Measuring vulnerabilities and their exploitation cycle. Inf. Secur. Tech. Rep. 8(4): 45-55 (2003) - [j8]Charles Iheagwara, Andrew Blyth, Mukesh Singhal:
A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment. J. Comput. Secur. 11(1): 1-33 (2003) - 2002
- [j7]Charles Iheagwara, Andrew Blyth:
Evaluation of the performance of ID systems in a switched and distributed environment: the RealSecure case study. Comput. Networks 39(2): 93-112 (2002) - [j6]Charles Iheagwara, Andrew Blyth:
The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments. Comput. Networks 39(6): 827-840 (2002) - [c6]Andrew Blyth, Daniel Cunliffe, Iain Sutherland:
XEON - An Architecture for an XML Enabled Firewall. ICEIS 2002: 1111-1116 - 2001
- [b2]Andrew Blyth, Gerald L. Kovacich:
Information Assurance - Surviving in the Information Environment. Computer Communications and Networks, Springer 2001, ISBN 978-1-85233-326-3, pp. i-xvii, 1-337
1990 – 1999
- 1999
- [j5]Andrew Blyth:
Footprinting for intrusion detection and threat assessment. Inf. Secur. Tech. Rep. 4(3): 43-53 (1999) - [j4]Andrew Blyth:
Using Stakeholders, Domain Knowledge, and Responsibilities to Specify Information Systems' Requirements. J. Organ. Comput. Electron. Commer. 9(4): 287-296 (1999) - 1998
- [c5]Nancy M. Lorenzi, Robert T. Riley, Andrew J. C. Blyth, Gray Southon, Bradley J. Dixon:
People and Organizational Aspects of Medical Informatics. MedInfo 1998: 1197-1200 - 1997
- [j3]Nancy M. Lorenzi, Robert T. Riley, Andrew J. C. Blyth, Gray Southon, Bradley J. Dixon:
Review: Antecedents of the People and Organizational Aspects of Medical Informatics: Review of the Literature. J. Am. Medical Informatics Assoc. 4(2): 79-93 (1997) - [j2]Andrew Blyth:
Issues arising from medical system's failure. ACM SIGSOFT Softw. Eng. Notes 22(2): 85-86 (1997) - [p1]Andrew Blyth:
Responsibility Modelling: A New Approach to the Re-Alignment and Re-Engineering of Health-Care Organisations. Personal Medical Information 1997: 117-127 - 1996
- [j1]Andrew Blyth:
What happens when a medical office information system fails. SIGCAS Comput. Soc. 26(4): 25-26 (1996) - 1995
- [b1]Andrew John Charles Blyth:
Enterprise modelling and its application to organisational requirements, capture and definition. Newcastle University, Newcastle upon Tyne, UK, 1995 - 1993
- [c4]Andrew J. C. Blyth, J. S. Chudge, John E. Dobson, Ros Strens:
A framework for modelling evolving requirements. COMPSAC 1993: 83-89 - [c3]Andrew Blyth, J. S. Chudge, John E. Dobson, Ros Strens:
ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements. COOCS 1993: 216-227 - [c2]Andrew Blyth, J. S. Chudge:
The Role of Interaction Analysis in Reuqirements Engineering. Information System Development Process 1993: 189-205 - 1992
- [c1]John E. Dobson, Andrew J. C. Blyth, J. S. Chudge, Ros Strens:
The ORDIT approach to requirements identification. COMPSAC 1992: 356-361
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint