I Sutherland
I Sutherland
Noroff University College
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα noroff.no
ΤίτλοςΠαρατίθεται απόΈτος
Acquiring volatile operating system data tools and techniques
I Sutherland, J Evans, T Tryfonas, A Blyth
ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008
552008
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage
V Mee, T Tryfonas, I Sutherland
Digital Investigation 3 (3), 166-173, 2006
552006
Adapting integrity enforcement techniques for data reconciliation
SM Embury, SM Brandt, JS Robinson, I Sutherland, FA Bisby, WA Gray, ...
Information Systems 26 (8), 657-689, 2001
482001
An empirical examination of the reverse engineering process for binary files
I Sutherland, GE Kalb, A Blyth, G Mulley
Computers & Security 25 (3), 221-228, 2006
252006
Penetration testing and vulnerability assessments: A professional approach
K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth
School of Computer and Information Science, Security Research Centre, Edith …, 2010
242010
Forensic analysis of smart TV: A current issue and call to arms
I Sutherland, H Read, K Xynos
Digital Investigation 11 (3), 175-178, 2014
222014
The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market
A Jones, C Valli, GS Dardick, I Sutherland
Journal of Digital Forensics, Security and Law 3 (1), 1, 2008
212008
The forensic utility of detecting disruptive electromagnetic interference
R Hoad, I Sutherland
ECIW2008-7th European Conference on Information Warfare and Security …, 2008
202008
The 2008 analysis of information remaining on disks offered for sale on the second hand market
A Jones, GS Dardick, G Davies, I Sutherland
J. Int'l Com. L. & Tech. 4, 162, 2009
192009
Xbox 360: A digital forensic investigation of the hard disk drive
K Xynos, S Harries, I Sutherland, G Davies, A Blyth
Digital Investigation 6 (3-4), 104-111, 2010
172010
The 2006 analysis of information remaining on disks offered for sale on the second hand market
A Jones, C Valli, I Sutherland, P Thomas
Journal of Digital Forensics, Security and Law 1 (3), 2, 2006
172006
Forensic analysis of a Sony PlayStation 4: A first look
M Davies, H Read, K Xynos, I Sutherland
Digital Investigation 12, S81-S89, 2015
162015
Analysis of Information remaining on Hand Held Devices offered for sale on the second hand market
A Jones, C Valli, I Sutherland
The Journal of Digital Forensics, Security and Law: JDFSL 3 (2), 55, 2008
142008
Techniques for effective integration, maintenance and evolution of species databases
AC Jones, I Sutherland, SM Embury, WA Gray, RJ White, JS Robinson, ...
Proceedings. 12th International Conference on Scientific and Statistica …, 2000
132000
Conflict detection for integration of taxonomic data sources
SM Embury, AC Jones, I Sutherland, WA Gray, RJ White, JS Robinson, ...
Proceedings. Eleventh International Conference on Scientific and Statistical …, 1999
131999
Effectiveness of blocking evasions in intrusion prevention system
K Xynos, I Sutherland, A Blyth
University of South Wales, 1-6, 2013
92013
Malware and steganography in hard disk firmware
I Sutherland, G Davies, A Blyth
Journal in computer virology 7 (3), 215-219, 2011
92011
Security analysis of XML usage and XML parsing
A Blyth, D Cunliffe, I Sutherland
Computers & Security 22 (6), 494-505, 2003
92003
Manipulation of hard drive firmware to conceal entire partitions
H Read, K Xynos, I Sutherland, G Davies, T Houiellebecq, F Roarson, ...
Digital Investigation 10 (4), 281-286, 2013
82013
The impact of hard disk firmware steganography on computer forensics
I Sutherland, G Davies, N Pringle, A Blyth
Journal of Digital Forensics, Security and Law 4 (2), 5, 2009
82009
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20