The SCEAS System
Navigation Menu

Search the dblp DataBase


Andrew Blyth: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nikolaos Avourdiadis, Andrew Blyth
    Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:9-20 [Conf]
  2. Grigorios Fragkos, Andrew Blyth
    Architecture for Near Real-Time Threat Assessment Using IDS Data. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:91-98 [Conf]
  3. Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth
    The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:99-106 [Conf]
  4. Richard Hoad, Andrew Blyth
    Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:117-128 [Conf]
  5. Huw Read, Andrew Blyth
    Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:281-292 [Conf]
  6. Andrew Blyth, J. Chudge, John E. Dobson, Ros Strens
    ORDIT: a new methodology to assist in the process of eliciting and modelling organizational requirements. [Citation Graph (0, 0)][DBLP]
    COOCS, 1993, pp:216-227 [Conf]
  7. Andrew Blyth, Daniel Cunliffe, Iain Sutherland
    XEON - An Architecture for an XML Enabled Firewall. [Citation Graph (0, 0)][DBLP]
    ICEIS, 2002, pp:1111-1116 [Conf]
  8. Charles Iheagwara, Andrew Blyth, Mike Bennett
    Architectural and Functional Issues in Systems Requirements Specifications for Wireless Intrusion Detection Systems Implementation. [Citation Graph (0, 0)][DBLP]
    ICW/ICHSN/ICMCS/SENET, 2005, pp:434-441 [Conf]
  9. Andrew Blyth, J. Chudge
    The Role of Interaction Analysis in Reuqirements Engineering. [Citation Graph (0, 0)][DBLP]
    Information System Development Process, 1993, pp:189-205 [Conf]
  10. Charles Iheagwara, Andrew Blyth
    Evaluation of the performance of ID systems in a switched and distributed environment: the RealSecure case study. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:39, n:2, pp:93-112 [Journal]
  11. Charles Iheagwara, Andrew Blyth
    The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:39, n:6, pp:827-840 [Journal]
  12. Andrew Blyth, Daniel Cunliffe, Iain Sutherland
    Security analysis of XML usage and XML parsing. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:494-505 [Journal]
  13. Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley
    An empirical examination of the reverse engineering process for binary files. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:221-228 [Journal]
  14. Charles Iheagwara, Andrew Blyth, Timm Kevin, David Kinn
    Cost effective management frameworks: the impact of IDS deployment technique on threat mitigation. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2004, v:46, n:10, pp:651-664 [Journal]
  15. Charles Iheagwara, Andrew Blyth, Mukesh Singhal
    A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:1, pp:1-33 [Journal]
  16. Charles Iheagwara, Andrew Blyth, Mukesh Singhal
    Cost effective management frameworks for intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:5, pp:777-798 [Journal]
  17. Andrew Blyth, Paula Thomas
    Performing real-time threat assessment of security incidents using data fusion of IDS logs. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:6, pp:513-534 [Journal]

  18. A Unified Approach to Network Traffic and Network Security Visualisation. [Citation Graph (, )][DBLP]

  19. Presenting DEViSE: Data Exchange for Visualizing Security Events. [Citation Graph (, )][DBLP]

  20. Xbox 360: A digital forensic investigation of the hard disk drive. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002