Konstantinos Xynos

Orcid: 0000-0002-3485-3832

According to our database1, Konstantinos Xynos authored at least 16 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Nintendo 3DS Forensic Examination Tools.
Proceedings of the Advances in Digital Forensics XIX, 2023

2019
Forensic Analysis of the Nintendo 3DS NAND.
Digit. Investig., 2019

2018
Welcome pwn: Almond smart home hub forensics.
Digit. Investig., 2018

2017
Forensic Evaluation of an Amazon Fire TV Stick.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

The Impact of Changing Technology on International Cybersecurity Curricula.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

2016
A Forensic Methodology for Analyzing Nintendo 3DS Devices.
Proceedings of the Advances in Digital Forensics XII, 2016

2015
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems.
Inf. Secur. J. A Glob. Perspect., 2015

Forensic analysis of a Sony PlayStation 4: A first look.
Digit. Investig., 2015

An Extensible Platform for the Forensic Analysis of Social Media Data.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
Forensic analysis of smart TV: A current issue and call to arms.
Digit. Investig., 2014

On the Development of Automated Forensic Analysis Methods for Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
Manipulation of hard drive firmware to conceal entire partitions.
Digit. Investig., 2013

2010
Xbox 360: A digital forensic investigation of the hard disk drive.
Digit. Investig., 2010

2009
Presenting DEViSE: Data Exchange for Visualizing Security Events.
IEEE Computer Graphics and Applications, 2009

2007
Online ID theft techniques, investigation and response.
Int. J. Electron. Secur. Digit. Forensics, 2007

2005
The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005


  Loading...