Konstantinos Xynos
Konstantinos Xynos
Professor, Noroff University College
Verified email at noroff.no - Homepage
Title
Cited by
Cited by
Year
Penetration testing and vulnerability assessments: A professional approach
K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth
School of Computer and Information Science, Security Research Centre, Edith …, 2010
232010
Forensic analysis of smart TV: A current issue and call to arms
I Sutherland, H Read, K Xynos
Digital Investigation 11 (3), 175-178, 2014
222014
Forensic analysis of a Sony PlayStation 4: A first look
M Davies, H Read, K Xynos, I Sutherland
Digital Investigation 12, S81-S89, 2015
192015
Xbox 360: A digital forensic investigation of the hard disk drive
K Xynos, S Harries, I Sutherland, G Davies, A Blyth
Digital Investigation 6 (3), 104-111, 2010
172010
Presenting devise: data exchange for visualizing security events
H Read, K Xynos, A Blyth
IEEE computer graphics and applications, 6-11, 2009
122009
Effectiveness of Blocking Evasions in Intrusion Prevention System
K Xynos, I Sutherland, A Blyth
University of South Wales, 1-6, 2013
92013
Manipulation of hard drive firmware to conceal entire partitions
H Read, K Xynos, I Sutherland, G Davies, T Houiellebecq, F Roarson, ...
Digital Investigation 10 (4), 281-286, 2013
82013
Network Forensic Investigation of Internal Misuse/Crime in Saudi Arabia: A Hacking Case
A Al-Murjan, K Xynos
Proceedings of the Conference on Digital Forensics, Security and Law, 15-32, 2008
7*2008
Online ID theft techniques, investigation and response
O Angelopoulou, P Thomas, K Xynos, T Tryfonas
International Journal of Electronic Security and Digital Forensics 1 (1), 76-88, 2007
52007
Welcome pwn: Almond smart home hub forensics
A Awasthi, HOL Read, K Xynos, I Sutherland
Digital Investigation 26, S38-S46, 2018
42018
Forensic Evaluation of an Amazon Fire TV Stick
L Morrison, H Read, K Xynos, I Sutherland
IFIP International Conference on Digital Forensics, 63-79, 2017
42017
A forensic methodology for analyzing Nintendo 3DS devices
H Read, E Thomas, I Sutherland, K Xynos, M Burgess
IFIP International Conference on Digital Forensics, 127-143, 2016
32016
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems
H Read, I Sutherland, K Xynos, F Roarson
Information Security Journal: A Global Perspective, 1-9, 2015
32015
An empirical methodology derived from the analysis of information remaining on second hand hard disks
G Fragkos, V Mee, K Xynos, O Angelopoulou
EC2ND 2006, 95-103, 2007
32007
Forensic Analysis of the Nintendo 3DS NAND
G Pessolano, HOL Read, I Sutherland, K Xynos
Digital Investigation 29, S61-S70, 2019
22019
The impact of changing technology on international cybersecurity curricula
H Read, I Sutherland, K Xynos, T Drange, E Sundt
International Conference on Human Aspects of Information Security, Privacy …, 2017
22017
On the Development of Automated Forensic Analysis Methods for Mobile Devices
P Andriotis, T Tryfonas, G Oikonomou, S Li, Z Tzermias, K Xynos, H Read, ...
Trust and Trustworthy Computing, 212-213, 2014
22014
The Geneva Conventions and Cyber-Warfare: A Technical Approach
I Sutherland, K Xynos, A Jones, A Blyth
The RUSI Journal 160 (4), 30-39, 2015
12015
Antivirus False-Positive Alerts, Evading Malware Detection, and Cyber-security Issues
G Fragkos, O Angelopoulou, K Xynos
Journal of Information Warfare 12 (3), 26-40, 2013
12013
A Modular Data Mining Architecture for Intrusion Detection Systems’ Data
K Xynos, A Blyth
4th European Conference on Information Warfare and Security, 229-237, 2008
12008
The system can't perform the operation now. Try again later.
Articles 1–20