Login / Signup
Huw Read
ORCID
Publication Activity (10 Years)
Years Active: 2005-2023
Publications (10 Years): 10
Top Topics
Smart Home
Social Media
Forensic Analysis
Ddos Attacks
Top Venues
Digit. Investig.
IFIP Int. Conf. Digital Forensics
HCI (22)
Inf. Secur. J. A Glob. Perspect.
</>
Publications
</>
Konstantinos Xynos
,
Huw Read
,
Iain Sutherland
,
Matthew Bovee
,
Trang Do
Nintendo 3DS Forensic Examination Tools.
IFIP Int. Conf. Digital Forensics
(2023)
Gus Pessolano
,
Huw Read
,
Iain Sutherland
,
Konstantinos Xynos
Forensic Analysis of the Nintendo 3DS NAND.
Digit. Investig.
(2019)
Akshay Awasthi
,
Huw Read
,
Konstantinos Xynos
,
Iain Sutherland
Welcome pwn: Almond smart home hub forensics.
Digit. Investig.
(2018)
Logan Morrison
,
Huw Read
,
Konstantinos Xynos
,
Iain Sutherland
Forensic Evaluation of an Amazon Fire TV Stick.
IFIP Int. Conf. Digital Forensics
(2017)
Huw Read
,
Iain Sutherland
,
Konstantinos Xynos
,
Tom Drange
,
Ernst Sundt
The Impact of Changing Technology on International Cybersecurity Curricula.
HCI (22)
(2017)
Huw Read
,
Elizabeth Thomas
,
Iain Sutherland
,
Konstantinos Xynos
,
Mikhaila Burgess
A Forensic Methodology for Analyzing Nintendo 3DS Devices.
IFIP Int. Conf. Digital Forensics
(2016)
Huw Read
,
Konstantinos Xynos
,
Iain Sutherland
,
Frode Roarson
,
Panagiotis Andriotis
,
George C. Oikonomou
An Extensible Platform for the Forensic Analysis of Social Media Data.
HCI (22)
(2015)
Iain Sutherland
,
Theodoros Spyridopoulos
,
Huw Read
,
Andy Jones
,
Graeme Sutherland
,
Mikhailia Burgess
Applying the ACPO Guidelines to Building Automation Systems.
HCI (22)
(2015)
Huw Read
,
Iain Sutherland
,
Konstantinos Xynos
,
Frode Roarson
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems.
Inf. Secur. J. A Glob. Perspect.
24 (1-3) (2015)
Matthew Davies
,
Huw Read
,
Konstantinos Xynos
,
Iain Sutherland
Forensic analysis of a Sony PlayStation 4: A first look.
Digit. Investig.
(2015)
Iain Sutherland
,
Huw Read
,
Konstantinos Xynos
Forensic analysis of smart TV: A current issue and call to arms.
Digit. Investig.
11 (3) (2014)
Panagiotis Andriotis
,
Theo Tryfonas
,
George C. Oikonomou
,
Shancang Li
,
Zacharias Tzermias
,
Konstantinos Xynos
,
Huw Read
,
Vassilis Prevelakis
On the Development of Automated Forensic Analysis Methods for Mobile Devices.
TRUST
(2014)
Huw Read
,
Konstantinos Xynos
,
Iain Sutherland
,
Gareth Davies
,
Tom Houiellebecq
,
Frode Roarson
,
Andrew Blyth
Manipulation of hard drive firmware to conceal entire partitions.
Digit. Investig.
10 (4) (2013)
Anthony Benham
,
Huw Read
,
Iain Sutherland
Network Attack Analysis and the Behaviour Engine.
AINA
(2013)
Huw Read
,
Konstantinos Xynos
,
Andrew Blyth
Presenting DEViSE: Data Exchange for Visualizing Security Events.
IEEE Computer Graphics and Applications
29 (3) (2009)
Huw Read
,
Andrew Blyth
,
Iain Sutherland
A Unified Approach to Network Traffic and Network Security Visualisation.
ICC
(2009)
Huw Read
,
Andrew Blyth
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data.
ECIW
(2005)