팔로우
I Sutherland
I Sutherland
Noroff University College
noroff.no의 이메일 확인됨
제목
인용
인용
연도
Acquiring volatile operating system data tools and techniques
I Sutherland, J Evans, T Tryfonas, A Blyth
ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008
662008
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage
V Mee, T Tryfonas, I Sutherland
Digital Investigation 3 (3), 166-173, 2006
572006
Adapting integrity enforcement techniques for data reconciliation
SM Embury, SM Brandt, JS Robinson, I Sutherland, FA Bisby, WA Gray, ...
Information Systems 26 (8), 657-689, 2001
492001
An empirical examination of the reverse engineering process for binary files
I Sutherland, GE Kalb, A Blyth, G Mulley
Computers & Security 25 (3), 221-228, 2006
342006
Forensic analysis of smart TV: A current issue and call to arms
I Sutherland, H Read, K Xynos
Digital Investigation 11 (3), 175-178, 2014
312014
Penetration testing and vulnerability assessments: A professional approach
K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth
School of Computer and Information Science, Security Research Centre, Edith …, 2010
282010
Welcome pwn: Almond smart home hub forensics
A Awasthi, HOL Read, K Xynos, I Sutherland
Digital Investigation 26, S38-S46, 2018
242018
Forensic analysis of a Sony PlayStation 4: A first look
M Davies, H Read, K Xynos, I Sutherland
Digital Investigation 12, S81-S89, 2015
242015
The forensic utility of detecting disruptive electromagnetic interference
R Hoad, I Sutherland
ECIW2008-7th European Conference on Information Warfare and Security …, 2008
232008
The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market
A Jones, C Valli, GS Dardick, I Sutherland
Journal of Digital Forensics, Security and Law 3 (1), 1, 2008
232008
The 2008 analysis of information remaining on disks offered for sale on the second hand market
A Jones, GS Dardick, G Davies, I Sutherland
J. Int'l Com. L. & Tech. 4, 162, 2009
212009
Xbox 360: A digital forensic investigation of the hard disk drive
K Xynos, S Harries, I Sutherland, G Davies, A Blyth
Digital Investigation 6 (3-4), 104-111, 2010
182010
The 2006 analysis of information remaining on disks offered for sale on the second hand market
A Jones, C Valli, I Sutherland, P Thomas
Journal of Digital Forensics, Security and Law 1 (3), 2, 2006
182006
Raspberry Pi Malware: An analysis of cyberattacks towards IoT devices
ED Martin, J Kargaard, I Sutherland
2019 10th International Conference on Dependable Systems, Services and …, 2019
172019
Malware and steganography in hard disk firmware
I Sutherland, G Davies, A Blyth
Journal in computer virology 7 (3), 215-219, 2011
152011
Challenges of interaction in online teaching: a case study
T Drange, I Sutherland, A Irons
Proceedings of the International Conference on E-Technologies and Business …, 2015
142015
Techniques for effective integration, maintenance and evolution of species databases
AC Jones, I Sutherland, SM Embury, WA Gray, RJ White, JS Robinson, ...
Proceedings. 12th International Conference on Scientific and Statistica …, 2000
122000
The 2009 analysis of information remaining on disks offered for sale on the second hand market
A Jones, C Valli, GS Dardick, I Sutherland, G Dabibi, G Davies
Journal of Digital Forensics, Security and Law 5 (4), 3, 2010
112010
Security analysis of XML usage and XML parsing
A Blyth, D Cunliffe, I Sutherland
Computers & Security 22 (6), 494-505, 2003
112003
Conflict detection for integration of taxonomic data sources
SM Embury, AC Jones, I Sutherland, WA Gray, RJ White, JS Robinson, ...
Proceedings. Eleventh International Conference on Scientific and Statistical …, 1999
111999
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20