Dr. Theo Tryfonas

PhD, MSc, BSc, MBCS CITP, MIET, CISA

Senior  Lecturer in Systems Engineering

Contact details

Systems Centre

Engineering faculty

Queen’s Building

Room 2.22

Tel: +44 (0)117 33 15740

email: theo.tryfonas@bristol.ac.uk

Research Interests

Systems engineering and Information assurance with research work focused on a diverse range of sectors, including transportation, utilities, healthcare and government. Worked in particular on systems for maritime safety and port security, public transport security, protection of UAVs, telecom revenue and system assurance, as well as assisted in the investigation of computer crimes.

Biography

A computer scientist by training and a systems engineer who discovered systems thinking during his doctoral research in the field of security engineering. He is involved in teaching and research supervision with the Systems Centre engineering doctorate (EngD) programme, as well as the cross-departmental MEng in Engineering Design. In the past he worked as a programmer, consultant and auditor and has kept close ties with industry after becoming an academic, providing on occasion expert witness advice, continuing professional development courses etc.

Research Projects in Systems

Tidal energy systems engineering

Sustainable Roofs

Urban information architectures

Wireless sensors and network resilience

Professional Bodies

Chartered Institute for IT, Institute of Engineering & Technology

Publications in Systems

Edited Volumes

N. Clarke and T. Tryfonas (eds.), Proc. of 4th Workshop on Digital Forensics and Incident Analysis, WDFIA 2009, Lulu.

P. Thomas and T. Tryfonas (assoc. eds.), Proc. of Workshop on Wireless and Mobile Security, IEEE NGMAST WMS 2008, IEEE CS Press.

S. Katsikas, A. Patel, T. Tryfonas, P. Thomas (eds.), Proc. of 3rd Workshop on Digital Forensics and Incident Analysis, ESORICS WDFIA 2008, IEEE CS Press.

B. Preneel, S. Gritzalis, S. Kokolakis, T. Tryfonas (eds.), Proc. of 2nd Workshop on Digital Forensics and Incident Analysis, WDFIA 2007, IEEE CS Press.

Contributed Chapters in Edited Books

Tryfonas, T. (2009), “Information Security Management and Standards of Best Practice”, in H. Jahankhani, D.L. Watson, G. Me and F. Leonhardt (eds.), Handbook of Electronic Security and Digital Forensics, World Scientific, pp.

To, W.M., Tryfonas, T. and Farthing, D. (2009), “Audit Log Unification and Review with Log Management Information Bases”, in H.-M. Haav and A. Kalja (eds.), Databases and Information Systems V, Frontiers in Artificial Intelligence and Applications series vol. 187, IOS Press, 180-191.

Academic Journal Papers (refereed)

Thomas, P., Tryfonas, T. and Sutherland, I. (2009), “An Analysis of the Curriculum Components of Computer Forensics Undergraduate Courses in the United Kingdom”, ITALICS – HEA Jour. on Innovation in Teaching And Learning in Information and Computer Sciences, 8(1), 39-44.

Styles, M. and Tryfonas, T. (2009), “Using Penetration Testing Feedback to Cultivate an Atmosphere of Proactive Security amongst End-users”, Information Management & Computer Security, 17(1), 44-52.

Davies, P., Tryfonas, T. (2009), “A lightweight web-based vulnerability scanner for small-scale computer network security assessment”, Jour. of Network and Computer Applications, 32(1), 78-95.

Sutherland, I., Evans, J., Tryfonas, T. and Blyth, A. (2008), “Acquiring Volatile Operating System Data Tools and Techniques”, ACM SIGOPS Operating Systems Review, 42(3), 65-73.

Tryfonas, T. and Kearney, B. (2008), “Standardising the Audit Automation of Integrated Business Applications with Security Patterns”, Computer Standards & Interfaces, 30(4), 262-270.

Kearney, B. and Tryfonas, T. (2008), “Security patterns for automated continuous auditing”, Information Security Jour.: A Global Perspective, 17(1), 13-25.

Tryfonas T. (2007), “On Security Metaphors and how they Shape the Emerging Practice of Secure Information Systems Development”, Jour. of Information System Security (JISSec), 3(3), 21-51.

Angelopoulou, O., Thomas, P., Xynos, K. and Tryfonas, T. (2007), “Online ID theft techniques, investigation and response”, Intl Jour. of Elec. Security and Digital Forensics, 1(1), 76–88.

Tryfonas, T., Sutherland, I. and Pompogiatzis, I. (2007), “Employing Penetration Testing as an Audit Methodology for the Security Review of VoIP: Tests and Examples”, Internet Research, 17(1), 61-87.

Mee, V., Tryfonas, T. and Sutherland, I. (2006), “The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage”, Digital Investigation, 3(3), 166-173.

Thomas, P. and Tryfonas, T. (2005), “An Interpretive Field Study of Competitive Intelligence in Software Development”, Jour. of Competitive Intelligence and Management, 3(3), 40-56.

Tsoumas, B. and Tryfonas, T. (2004), “From Risk Analysis to Effective Security Management”, Information Management & Computer Security, 12(1), 91-101.

Tryfonas, T., Kiountouzis, E. and Poulymenakou, A. (2001), “Embedding security practices in contemporary information systems development approaches”, Information Management & Computer Security, 9(4), 183-197.

Professional Journal Papers

Parfitt, M. and Tryfonas, T. (2009), “Painless: A Model for IT Governance Assessment in the UK Public Sector”, EDPACS – The EDP Audit, Control, and Security Newsletter, 39(2-3), 1-25.

Read, H., Blyth, A. and Tryfonas, T. (2007), “IDS Data Visualisation: Potential and Challenges for Comprehensive Security Incident Analysis”, ENISA Quarterly Review, 3(2), 5-7.

Tryfonas, T., Thomas, P. and Owen, P. (2006), “ID Theft: Fraudster Techniques for Personal Data Collection, the Related Digital Evidence and Investigation Issues”, JOnline, Vol. 1, January.

Conference contributions in 2009-10 - refereed (full list in total 29)

Tryfonas, T. and Davies, M. (2009), “Playing CAAT and mouse in the tutorial class”, Proc. of the British Accounting Association‟s Accounting Education Special Interest Group Annual Conf., BAA AE SIG 2009 (Essex, 20-22 May), England.

Askoxylakis, I.G., Markantonakis, K., Tryfonas, T., May, J. and Traganitis, A. (2009), “A face centered cubic key agreement mechanism for mobile ad hoc networks”, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 13: Mobile Lightweight Wireless Systems, ICST Mobilight 2009 (Athens, May 18-20), Greece, Springer, 103-113.

King, J. and Tryfonas, T. (2009), “Tidal Stream Power Technology – State of the Art”, Proc. of OCEANS ‟09 IEEE Bremen Conf., (Bremen, May 11-14), Germany (electronic edition, ISBN 978-1-4244-2523-5).

Tryfonas, T. and Thomas, P. (2009), “Integrating Competitor Intelligence Capability within the Software Development Lifecycle”, Proc. of 5th NATO Intl. Scientific Conf. on Security and Protection of Information, SPI 2009 (Brno, May 5-7), Czech Republic, 115-127.

Teaching

Core Units:

Introduction to Systems (EngD)

Engineering Systems 2 (Civil & Aero)

Specialist Units

UML and Case Studies (Eng Design)

Sustainable Systems (Eng F)