2006 |
17 | EE | Iain Sutherland,
George E. Kalb,
Andrew Blyth,
Gaius Mulley:
An empirical examination of the reverse engineering process for binary files.
Computers & Security 25(3): 221-228 (2006) |
16 | EE | Andrew Blyth,
Paula Thomas:
Performing real-time threat assessment of security incidents using data fusion of IDS logs.
Journal of Computer Security 14(6): 513-534 (2006) |
2005 |
15 | | Richard Hoad,
Andrew Blyth:
Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection.
ECIW 2005: 117-128 |
14 | | Huw Read,
Andrew Blyth:
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data.
ECIW 2005: 281-292 |
13 | | Nikolaos Avourdiadis,
Andrew Blyth:
Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment.
ECIW 2005: 9-20 |
12 | | Grigorios Fragkos,
Andrew Blyth:
Architecture for Near Real-Time Threat Assessment Using IDS Data.
ECIW 2005: 91-98 |
11 | | Grigorios Fragkos,
Konstantinos Xynos,
Andrew Blyth:
The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment.
ECIW 2005: 99-106 |
10 | EE | Charles Iheagwara,
Andrew Blyth,
Mike Bennett:
Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation.
ICW/ICHSN/ICMCS/SENET 2005: 434-441 |
2004 |
9 | EE | Charles Iheagwara,
Andrew Blyth,
Timm Kevin,
David Kinn:
Cost effective management frameworks: the impact of IDS deployment technique on threat mitigation.
Information & Software Technology 46(10): 651-664 (2004) |
8 | | Charles Iheagwara,
Andrew Blyth,
Mukesh Singhal:
Cost effective management frameworks for intrusion detection systems.
Journal of Computer Security 12(5): 777-798 (2004) |
2003 |
7 | EE | Andrew Blyth,
Daniel Cunliffe,
Iain Sutherland:
Security analysis of XML usage and XML parsing.
Computers & Security 22(6): 494-505 (2003) |
6 | | Charles Iheagwara,
Andrew Blyth,
Mukesh Singhal:
A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment.
Journal of Computer Security 11(1): 1-33 (2003) |
2002 |
5 | | Andrew Blyth,
Daniel Cunliffe,
Iain Sutherland:
XEON - An Architecture for an XML Enabled Firewall.
ICEIS 2002: 1111-1116 |
4 | EE | Charles Iheagwara,
Andrew Blyth:
Evaluation of the performance of ID systems in a switched and distributed environment: the RealSecure case study.
Computer Networks 39(2): 93-112 (2002) |
3 | EE | Charles Iheagwara,
Andrew Blyth:
The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments.
Computer Networks 39(6): 827-840 (2002) |
1993 |
2 | EE | Andrew Blyth,
J. Chudge,
John E. Dobson,
Ros Strens:
ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements.
COOCS 1993: 216-227 |
1 | | Andrew Blyth,
J. Chudge:
The Role of Interaction Analysis in Reuqirements Engineering.
Information System Development Process 1993: 189-205 |