Konstantinos Xynos
Konstantinos Xynos
Unknown affiliation
Verified email at - Homepage
Cited by
Cited by
Welcome pwn: Almond smart home hub forensics
A Awasthi, HOL Read, K Xynos, I Sutherland
Digital Investigation 26, S38-S46, 2018
Forensic analysis of smart TV: A current issue and call to arms
I Sutherland, H Read, K Xynos
Digital Investigation 11 (3), 175-178, 2014
Penetration testing and vulnerability assessments: A professional approach
K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth
School of Computer and Information Science, Security Research Centre, Edith …, 2010
Forensic analysis of a Sony PlayStation 4: A first look
M Davies, H Read, K Xynos, I Sutherland
Digital Investigation 12, S81-S89, 2015
Xbox 360: A digital forensic investigation of the hard disk drive
K Xynos, S Harries, I Sutherland, G Davies, A Blyth
Digital Investigation 6 (3), 104-111, 2010
Forensic Analysis of the Nintendo 3DS NAND
G Pessolano, HOL Read, I Sutherland, K Xynos
Digital Investigation 29, S61-S70, 2019
Presenting devise: data exchange for visualizing security events
H Read, K Xynos, A Blyth
IEEE computer graphics and applications, 6-11, 2009
A forensic overview of the LG Smart TV
I Sutherland, K Xynos, H Read, A Jones, T Drange
Effectiveness of Blocking Evasions in Intrusion Prevention System
K Xynos, I Sutherland, A Blyth
University of South Wales, 1-6, 2013
Network Forensic Investigation of Internal Misuse/Crime in Saudi Arabia: A Hacking Case
A Al-Murjan, K Xynos
Proceedings of the Conference on Digital Forensics, Security and Law, 15-32, 2008
Manipulation of hard drive firmware to conceal entire partitions
H Read, K Xynos, I Sutherland, G Davies, T Houiellebecq, F Roarson, ...
Digital Investigation 10 (4), 281-286, 2013
Online ID theft techniques, investigation and response
O Angelopoulou, P Thomas, K Xynos, T Tryfonas
International Journal of Electronic Security and Digital Forensics 1 (1), 76-88, 2007
The impact of changing technology on international cybersecurity curricula
H Read, I Sutherland, K Xynos, T Drange, E Sundt
International Conference on Human Aspects of Information Security, Privacy …, 2017
Forensic Evaluation of an Amazon Fire TV Stick
L Morrison, H Read, K Xynos, I Sutherland
IFIP International Conference on Digital Forensics, 63-79, 2017
A forensic methodology for analyzing Nintendo 3DS devices
H Read, E Thomas, I Sutherland, K Xynos, M Burgess
IFIP International Conference on Digital Forensics, 127-143, 2016
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems
H Read, I Sutherland, K Xynos, F Roarson
Information Security Journal: A Global Perspective, 1-9, 2015
The Geneva Conventions and Cyber-Warfare: A Technical Approach
I Sutherland, K Xynos, A Jones, A Blyth
The RUSI Journal 160 (4), 30-39, 2015
On the Development of Automated Forensic Analysis Methods for Mobile Devices
P Andriotis, T Tryfonas, G Oikonomou, S Li, Z Tzermias, K Xynos, H Read, ...
Trust and Trustworthy Computing, 212-213, 2014
An empirical methodology derived from the analysis of information remaining on second
G Fragkos, V Mee, K Xynos, O Angelopoulou
EC2ND 2006: Proceedings of the Second European Conference on Computer …, 2010
A first-layer authentication method: Gateway authentication program
K Xynos, A Blyth, PA Roach
Manuscript received, 2010
The system can't perform the operation now. Try again later.
Articles 1–20