dblp.uni-trier.dewww.uni-trier.de

Andrew Blyth

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
17EEIain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley: An empirical examination of the reverse engineering process for binary files. Computers & Security 25(3): 221-228 (2006)
16EEAndrew Blyth, Paula Thomas: Performing real-time threat assessment of security incidents using data fusion of IDS logs. Journal of Computer Security 14(6): 513-534 (2006)
2005
15 Richard Hoad, Andrew Blyth: Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection. ECIW 2005: 117-128
14 Huw Read, Andrew Blyth: Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data. ECIW 2005: 281-292
13 Nikolaos Avourdiadis, Andrew Blyth: Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment. ECIW 2005: 9-20
12 Grigorios Fragkos, Andrew Blyth: Architecture for Near Real-Time Threat Assessment Using IDS Data. ECIW 2005: 91-98
11 Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth: The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. ECIW 2005: 99-106
10EECharles Iheagwara, Andrew Blyth, Mike Bennett: Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation. ICW/ICHSN/ICMCS/SENET 2005: 434-441
2004
9EECharles Iheagwara, Andrew Blyth, Timm Kevin, David Kinn: Cost effective management frameworks: the impact of IDS deployment technique on threat mitigation. Information & Software Technology 46(10): 651-664 (2004)
8 Charles Iheagwara, Andrew Blyth, Mukesh Singhal: Cost effective management frameworks for intrusion detection systems. Journal of Computer Security 12(5): 777-798 (2004)
2003
7EEAndrew Blyth, Daniel Cunliffe, Iain Sutherland: Security analysis of XML usage and XML parsing. Computers & Security 22(6): 494-505 (2003)
6 Charles Iheagwara, Andrew Blyth, Mukesh Singhal: A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment. Journal of Computer Security 11(1): 1-33 (2003)
2002
5 Andrew Blyth, Daniel Cunliffe, Iain Sutherland: XEON - An Architecture for an XML Enabled Firewall. ICEIS 2002: 1111-1116
4EECharles Iheagwara, Andrew Blyth: Evaluation of the performance of ID systems in a switched and distributed environment: the RealSecure case study. Computer Networks 39(2): 93-112 (2002)
3EECharles Iheagwara, Andrew Blyth: The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments. Computer Networks 39(6): 827-840 (2002)
1993
2EEAndrew Blyth, J. Chudge, John E. Dobson, Ros Strens: ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements. COOCS 1993: 216-227
1 Andrew Blyth, J. Chudge: The Role of Interaction Analysis in Reuqirements Engineering. Information System Development Process 1993: 189-205

Coauthor Index

1Nikolaos Avourdiadis [13]
2Mike Bennett [10]
3J. Chudge [1] [2]
4Daniel Cunliffe [5] [7]
5John E. Dobson [2]
6Grigorios Fragkos [11] [12]
7Richard Hoad [15]
8Charles Iheagwara [3] [4] [6] [8] [9] [10]
9George E. Kalb [17]
10Timm Kevin [9]
11David Kinn [9]
12Gaius Mulley [17]
13Huw Read [14]
14Mukesh Singhal [6] [8]
15Ros Strens [2]
16Iain Sutherland [5] [7] [17]
17Paula Thomas [16]
18Konstantinos Xynos [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)