Jamie Graves

Edinburgh, Scotland, United Kingdom Contact Info
3K followers 500+ connections

Join to view profile

About

I am a technology leader who has spent the past 15 years of my career bringing cutting…

Articles by Jamie

See all articles

Activity

Join now to see all activity

Experience & Education

  • Dayshape

View Jamie’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Publications

  • Towards a Framework For Evaluating System Call Data as a Source of Digital Forensic Evidence

    The 2nd Conference on Advances in Computer Security and Forensics

    Other authors
  • Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations

    5th European Conference on Information Warfare and Security

    Other authors

Patents

  • Forensic Analysis

    Filed US US 2018/0351979 Al

    A forensic analysis method performed in respect of an endpoint device connected to a computer network. The forensic analysis method comprises collecting file system call data from the endpoint
    device. The file system call data corresponds to a plurality of system calls relating to file system operations arising from activity performed on the endpoint device. The forensic analysis method also comprises collecting network communication metadata from the endpoint device. The network…

    A forensic analysis method performed in respect of an endpoint device connected to a computer network. The forensic analysis method comprises collecting file system call data from the endpoint
    device. The file system call data corresponds to a plurality of system calls relating to file system operations arising from activity performed on the endpoint device. The forensic analysis method also comprises collecting network communication metadata from the endpoint device. The network communication metadata is based on a plurality of system calls relating to communication operations over the computer network arising from activity performed on the endpoint device. The forensic
    analysis method further comprises detecting first candidate data comprised in one of the collected file system call data and the collected network communication metadata and identifying second candidate data in the other of the collected file system call data and the collected network communication metadata with the second candidate data corresponding to the first candidate data. The forensic analysis method yet further comprises analysing the second candidate data to determine whether or not the first and second candidate data correspond to suspect activity performed on the endpoint device.

    Other inventors
  • Forensic Analysis

    Issued GB US 10,652,255 B2

    Other inventors
  • Digital Forensics

    Issued US 8887274

    New digital forensic techniques and systems are disclosed. System call information is collected from a device under test (DUT) and converted to a sequence format. Thereafter, sequence alignment methods and tools can be used to investigate and identify patterns of behavior that are suspicious.

    Other inventors

More activity by Jamie

View Jamie’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jamie directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Jamie Graves in United Kingdom

Add new skills with these courses