Andrew Jones

Orcid: 0000-0003-0116-5192

Affiliations:
  • University of Hertfordshire, School of Computer Science, Hatfield, UK
  • University of Derby, UK (since 2015)
  • University of South Wales, Pontypridd, UK (since 2015)
  • De Montfort University, Leicester, UK (since 2014)
  • University of South Australia, Adelaide, SA, Australia (since 2011)
  • Edith Cowan University, Joondalup, WA, Australia (since 2004)
  • Khalifa University of Science Technology and Research, Abu Dhabi, UAE (2009 - 2013)
  • University of Hertfordshire, School of Computer Science, Hatfield, UK (PhD 2004)


According to our database1, Andrew Jones authored at least 17 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Sharia Law and Digital Forensics in Saudi Arabia.
J. Digit. Forensics Secur. Law, 2018

2015
The Value of Metadata in Digital Forensics.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

2014
A State-of-the-Art Review of Cloud Forensics.
J. Digit. Forensics Secur. Law, 2014

2013
On the Reliability of Cryptopometry.
Int. J. Digit. Crime Forensics, 2013

An Empirical Evaluation for Feature Selection Methods in Phishing Email Classification.
Comput. Syst. Sci. Eng., 2013

Phishing Detection: A Literature Survey.
IEEE Commun. Surv. Tutorials, 2013

Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure.
Comput. J., 2013

A Distributed Snapshot Framework for Digital Forensics Evidence Extraction and Event Reconstruction from Cloud Environment.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Smart-frame: A flexible, scalable, and secure information management framework for smart grids.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Forensics data acquisition methods for mobile phones.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Lexical URL analysis for discriminating phishing and legitimate e-mail messages.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Mitigation of spear phishing attacks: A Content-based Authorship Identification framework.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

A study of feature subset evaluators and feature subset searching methods for phishing classification.
Proceedings of the 8th Annual Collaboration, 2011

Lexical URL analysis for discriminating phishing and legitimate websites.
Proceedings of the 8th Annual Collaboration, 2011

2010
Forensic Analysis of the Windows 7 Registry.
J. Digit. Forensics Secur. Law, 2010

2009
How do you make information security user friendly?
Inf. Secur. Tech. Rep., 2009

2007
Convergence.
Inf. Secur. Tech. Rep., 2007


  Loading...