Staff Directory

Prof Andrew Blyth known as Head of Information Security Research Group

Contact Details

Log in to update your profile


BSc (Hons) 2:2 – Computer Science, Computing Laboratory, University of Newcastle Upon Tyne. 1988
MSc – Computer Software and Systems Design, Computing Laboratory, University of Newcastle Upon Tyne. 1989
PhD – Enterprise Modelling and its application to Organisational Requirements Capture and Definition, Computing Laboratory, University of Newcastle Upon Tyne. 1988


Charitoudi K. and Blyth A., (2013) An Agent-Based Socio-technical Approach to Impact Assessment for Cyber Defense, 4th International Conference on Emerging Intelligent Data and Web Technologies, CEWE 2013, XI’AN, CHINA, 9-11 Sep. 2013

Charitoudi K. and Blyth A., (2013) A Socio-Technical Approach to Cyber Risk Management and Impact Assessment, Journal of Information Security, Vol 4, No 1, January 2013, DOI: 10.4236/jis.2013.41005.

Sutherland I., Xynos K., Andrew Jones A. and Blyth A. (2012), Protective Emblems in Cyber Warfare, 2012 SECAU Security Congress, 3-5 December, 2012.

Morakis E., Blyth A., (2011) Defining High-Level Signatures Using the Footprint Mark-up Language (FTML), Journal of Computer Science and Engineering, January 2011,pp. 5-14, Volume 5, Issue 1.

Sutherland I., Davies G., Blyth A.J.C. (2011) Malware and Steganography in Hard Disk Firmware, Journal of Computer Virology, 01 July 2011, pp. 215-219, Springer Paris, Vol. 7 (3).

Sutherland I., Davies G., Jones A, Blyth A. J.C. (2010) Zombie Hard Disks: Data from the living dead, 8th Australian Digital Forensics Conference, Edith Cowan University, November 28th – December 2nd, 2010.

Xynos, K, Sutherland, I, Read, H, Everitt, E and Blyth, A, (2010), “Penetration Testing and Vulnerability Assessments: A Professional Approach”, Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western Australia, 23-24 August 2010.

Xynos, K, Harries, S, Sutherland, I, Davies, G, Blyth, A, (2010), “Xbox 360: A digital forensic investigation of the hard disk drive”, Digital Investigation, Volume 6, Issues 3-4, Embedded Systems Forensics: Smart Phones, GPS Devices, and Gaming Consoles, May 2010, Pages 104-111, ISSN 1742-2876, DOI: 10.1016/j.diin.2010.02.004.

Xynos K. and Blyth A. (2010) “A First-layer Authentication Method: Gateway Authentication
Program” ,Proceedings of the 5th Research Student Workshop (P.A Roach (Ed.)),University of Glamorgan, Pontypridd, Wales, UK, pp.25-27, Feb. 2010, ISBN:978-1-84054-233-2


A member of the ACM


Professor Blyth has performed consultancy for the following organisations:
O Various Government agencies such as DSTL/MOD and Cabinet Office.
O Various Law Enforcement agencies such as MET Police and PSNI.

If you are a journalist on deadline and you need to speak with a member of university staff with particular expertise, please contact the Press Office.