I Sutherland
I Sutherland
Noroff University College
Verified email at noroff.no
Title
Cited by
Cited by
Year
Acquiring volatile operating system data tools and techniques
I Sutherland, J Evans, T Tryfonas, A Blyth
ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008
592008
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage
V Mee, T Tryfonas, I Sutherland
Digital Investigation 3 (3), 166-173, 2006
552006
Adapting integrity enforcement techniques for data reconciliation
SM Embury, SM Brandt, JS Robinson, I Sutherland, FA Bisby, WA Gray, ...
Information Systems 26 (8), 657-689, 2001
492001
An empirical examination of the reverse engineering process for binary files
I Sutherland, GE Kalb, A Blyth, G Mulley
Computers & Security 25 (3), 221-228, 2006
272006
Forensic analysis of smart TV: A current issue and call to arms
I Sutherland, H Read, K Xynos
Digital Investigation 11 (3), 175-178, 2014
232014
Penetration testing and vulnerability assessments: A professional approach
K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth
School of Computer and Information Science, Security Research Centre, Edith …, 2010
232010
The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market
A Jones, C Valli, GS Dardick, I Sutherland
International Journal of Liability and Scientific Enquiry 2 (1), 53-68, 2009
222009
The forensic utility of detecting disruptive electromagnetic interference
R Hoad, I Sutherland
ECIW2008-7th European Conference on Information Warfare and Security …, 2008
212008
The 2008 analysis of information remaining on disks offered for sale on the second hand market
A Jones, GS Dardick, G Davies, I Sutherland
J. Int'l Com. L. & Tech. 4, 162, 2009
202009
Forensic analysis of a Sony PlayStation 4: A first look
M Davies, H Read, K Xynos, I Sutherland
Digital Investigation 12, S81-S89, 2015
192015
Xbox 360: A digital forensic investigation of the hard disk drive
K Xynos, S Harries, I Sutherland, G Davies, A Blyth
Digital Investigation 6 (3-4), 104-111, 2010
172010
The 2006 analysis of information remaining on disks offered for sale on the second hand market
A Jones, C Valli, I Sutherland, P Thomas
Journal of Digital Forensics, Security and Law 1 (3), 2, 2006
172006
Techniques for effective integration, maintenance and evolution of species databases
AC Jones, I Sutherland, SM Embury, WA Gray, RJ White, JS Robinson, ...
Proceedings. 12th International Conference on Scientific and Statistica …, 2000
142000
Analysis of Information remaining on Hand Held Devices offered for sale on the second hand market
A Jones, C Valli, I Sutherland
The Journal of Digital Forensics, Security and Law: JDFSL 3 (2), 55, 2008
122008
Conflict detection for integration of taxonomic data sources
SM Embury, AC Jones, I Sutherland, WA Gray, RJ White, JS Robinson, ...
Proceedings. Eleventh International Conference on Scientific and Statistical …, 1999
111999
Challenges of interaction in online teaching: A case study
T Drange, I Sutherland, A Irons
Proceedings of the International Conference on E-Technologies and Business …, 2015
92015
Effectiveness of blocking evasions in intrusion prevention system
K Xynos, I Sutherland, A Blyth
University of South Wales, 1-6, 2013
92013
Malware and steganography in hard disk firmware
I Sutherland, G Davies, A Blyth
Journal in computer virology 7 (3), 215-219, 2011
92011
Security analysis of XML usage and XML parsing
A Blyth, D Cunliffe, I Sutherland
Computers & Security 22 (6), 494-505, 2003
92003
A forensic overview of the LG Smart TV
I Sutherland, K Xynos, H Read, A Jones, T Drange
82014
The system can't perform the operation now. Try again later.
Articles 1–20