Curriculum Vitae

Konstantinos Xynos

BSc MSc MBCS FHEA

Lecturer / Comp. Security Specialist / Programmer

I lecture at the University of South Wales (previously known as University of Glamorgan) (http://www.southwales.ac.uk | http://www.glam.ac.uk) in the subject area of Computer Systems Security. I also have a keen interest in Computer Forensics. Over the years I also work as a part-time consultant, representing the Uni. of South Wales on a number of computer security related projects. In my free time I like to write programs, read books (mainly Sci-Fi) and play video games.

Technical Skills

  • Programming 11 Years, Intermediate to Advanced

    I have a number of years of experience in programming in an number of programming and scripting languages. As a programmer I am capable of learning new programming languages. My experience includes the following: Python, C, C++, Perl, Java, C#.

Work Experience

  • Lecturer - University of South Wales, Full Time 2010 - Present

    I work full time as a lecturer on postgraduate and undergraduate degrees in computer security.

  • Consultant - University of South Wales, Part Time 2005 - Present

    I am also a part time consultant working for the Uni. of South Wales on a number of consultancy projects in collaboration with a number of companies.

  • Examining Body (Examiner) - Tiger Scheme Ltd 2009 - Present

    I am in charge of the examination of candidates wanting to complete the Senior Security Tester (CHECK Team Leader equivalent).

Education

  • MSc (Distinction) Computer Systems Security, Uni. of Glamorgan 2005

    In 2005 I completed my postgraduate studies in Computer Systems Security with Distinction.

  • BSc (Honours) Software Engineering, Uni. of Glamorgan 2004

    In 2004 I completed my undergraduate studies in Software Engineering with Honours.

Selected Published Academic Papers

  • Fragkos, G, Angelopoulou, O., and Xynos, K., (2013), Antivirus False Positives Alerts, Evading Malware Detection and CyberSecurity Issues, Journal of Information Warfare, Vol 12, Issue 3, Oct 2013.

  • Fragkos, G, Angelopoulou, O., and Xynos, K., (2013), The issues of software being classified as malicious by Antivirus false positive alerts, Proceedings of the European Conference on Informations Warfare and Security, 2013 (ECIW 2013), University of Jyväskylä, Finland, Jul 2013.

  • Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth, (2013) Manipulation of hard drive firmware to conceal entire partitions, Digital Investigation,Volume 10, Issue 4, December 2013, Pages 281–286, Available online 19 November 2013, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2013.10.001.

  • Read H., Sutherland I., Xynos K., (2013) Networked War Games: Training the Intrusion Detection Specialist, IADIS International Journal on WWW/INTERNET, Vol. 11, No. 1, pp. 53-61, ISSN: 1645-7641

  • Xynos K., Sutherland I. and Blyth A., (2013) "Effectiveness of blocking evasions in Intrusion Prevention Systems", Whitepaper, Apr 2013. Access here:http://security.research.glam.ac.uk/media/files/documents/2013-04-22/Effectiveness_of_blocking_evasions_in_Intrusion_Prevention_Systems.pdf

  • Sutherland I., Xynos K., Andrew Jones A. and Blyth A. (2012), Protective Emblems in Cyber Warfare, 2012 SECAU Security Congress, 3-5 December, 2012, Won: Best Paper in Theme and Best in Conference

  • Xynos K., Sutherland I, Huw Read, Emlyn Everitt and Blyth A. (2010), "Penetration Testing and Vulnerability Assessments: A Professional Approach", 2010 International Cyber Resilience Conference, 23-24 August 2010, Perth, Western Australia, ISBN 978-0-7298-0690-9.

  • Xynos K., Harries S., Sutherland I., Davies G., and Blyth A., (2010), ”Xbox 360: A digital forensic investigation of the hard disk drive”, Digital Investigation, Volume 6, Issues 3-4, Embedded Systems Forensics: Smart Phones, GPS Devices, and Gaming Consoles, May 2010, Pages 104-111, ISSN 1742-2876, DOI: 10.1016/j.diin.2010.02.004.

  • Read H., Xynos K., Blyth A., (2009) ”Presenting DEViSE: Data Exchange for Visualizing Security Events”, IEEE Computer Graphics and Applications, vol. 29, no. 3, pp. 6-11, May/June 2009, doi:10.1109/MCG.2009.48

  • Xynos K. and Blyth A. (2009) ”XSM: A web service enabled database management system for relational databases”, Proceedings of the 4th Research Student Workshop (P.A Roach (Ed.)), University of Glamorgan, Pontypridd, Wales, UK, pp.85-89, 12 March 2009. ISBN:978-1-84054-224-0

Professional Membership

  • MBCS member, IEEE member, IEEE Computer Society, IEEE Communications Society, IEEE Computational Intelligence Society, The First Forensic Forum (F3), TigerScheme Ltd (Examiner)

Languages

  • English Native

  • Greek Native

My Social Network

  • Design & code based on Richard Carpenter. Other Copyright (c) Konstantinos Xynos (2012)

Curriculum Vitae