Follow
I Sutherland
I Sutherland
Noroff University College
Verified email at noroff.no - Homepage
Title
Cited by
Cited by
Year
Acquiring volatile operating system data tools and techniques
I Sutherland, J Evans, T Tryfonas, A Blyth
ACM SIGOPS Operating Systems Review 42 (3), 65-73, 2008
712008
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage
V Mee, T Tryfonas, I Sutherland
Digital Investigation 3 (3), 166-173, 2006
562006
Adapting integrity enforcement techniques for data reconciliation
SM Embury, SM Brandt, JS Robinson, I Sutherland, FA Bisby, WA Gray, ...
Information Systems 26 (8), 657-689, 2001
542001
Welcome pwn: Almond smart home hub forensics
A Awasthi, HOL Read, K Xynos, I Sutherland
Digital Investigation 26, S38-S46, 2018
372018
Forensic analysis of smart TV: A current issue and call to arms
I Sutherland, H Read, K Xynos
Digital Investigation 11 (3), 175-178, 2014
362014
Penetration testing and vulnerability assessments: A professional approach
K Xynos, I Sutherland, H Read, E Everitt, AJC Blyth
School of Computer and Information Science, Security Research Centre, Edith …, 2010
352010
An empirical examination of the reverse engineering process for binary files
I Sutherland, GE Kalb, A Blyth, G Mulley
Computers & Security 25 (3), 221-228, 2006
352006
Forensic analysis of a Sony PlayStation 4: A first look
M Davies, H Read, K Xynos, I Sutherland
Digital Investigation 12, S81-S89, 2015
282015
The forensic utility of detecting disruptive electromagnetic interference
R Hoad, I Sutherland
ECIW2008-7th European Conference on Information Warfare and Security …, 2008
262008
The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market
A Jones, C Valli, GS Dardick, I Sutherland
International Journal of Liability and Scientific Enquiry 2 (1), 53-68, 2009
242009
Raspberry Pi Malware: An analysis of cyberattacks towards IoT devices
ED Martin, J Kargaard, I Sutherland
2019 10th International Conference on Dependable Systems, Services and …, 2019
232019
The 2008 analysis of information remaining on disks offered for sale on the second hand market
A Jones, GS Dardick, G Davies, I Sutherland
J. Int'l Com. L. & Tech. 4, 162, 2009
222009
Xbox 360: A digital forensic investigation of the hard disk drive
K Xynos, S Harries, I Sutherland, G Davies, A Blyth
Digital Investigation 6 (3-4), 104-111, 2010
202010
Challenges of interaction in online teaching: A case study
T Drange, I Sutherland, A Irons
Proceedings of the International Conference on E-Technologies and Business …, 2015
182015
Malware and steganography in hard disk firmware
I Sutherland, G Davies, A Blyth
Journal in computer virology 7, 215-219, 2011
182011
The 2006 analysis of information remaining on disks offered for sale on the second hand market
A Jones, C Valli, I Sutherland, P Thomas
Journal of Digital Forensics, Security and Law 1 (3), 2, 2006
172006
Techniques for effective integration, maintenance and evolution of species databases
AC Jones, I Sutherland, SM Embury, WA Gray, RJ White, JS Robinson, ...
Proceedings. 12th International Conference on Scientific and Statistica …, 2000
152000
The 2009 analysis of information remaining on disks offered for sale on the second hand market
A Jones, C Valli, GS Dardick, I Sutherland, G Dabibi, G Davies
Journal of Digital Forensics, Security and Law 5 (4), 3, 2010
142010
Security analysis of XML usage and XML parsing
A Blyth, D Cunliffe, I Sutherland
Computers & Security 22 (6), 494-505, 2003
142003
Forensic analysis of the Nintendo 3DS NAND
G Pessolano, HOL Read, I Sutherland, K Xynos
Digital Investigation 29, S61-S70, 2019
132019
The system can't perform the operation now. Try again later.
Articles 1–20