default search action
Iain Sutherland
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c17]Konstantinos Xynos, Huw Read, Iain Sutherland, Matthew Bovee, Trang Do:
Nintendo 3DS Forensic Examination Tools. IFIP Int. Conf. Digital Forensics 2023: 55-70
2010 – 2019
- 2019
- [j18]Gus Pessolano, Huw Read, Iain Sutherland, Konstantinos Xynos:
Forensic Analysis of the Nintendo 3DS NAND. Digit. Investig. 29 Supplement: S61-S70 (2019) - [c16]Erik David Martin, Joakim Kargaard, Iain Sutherland:
Raspberry Pi Malware: An Analysis of Cyberattacks Towards IoT Devices. DESSERT 2019: 161-166 - 2018
- [j17]Akshay Awasthi, Huw Read, Konstantinos Xynos, Iain Sutherland:
Welcome pwn: Almond smart home hub forensics. Digit. Investig. 26 Supplement: S38-S46 (2018) - 2017
- [c15]Huw Read, Iain Sutherland, Konstantinos Xynos, Tom Drange, Ernst Sundt:
The Impact of Changing Technology on International Cybersecurity Curricula. HCI (22) 2017: 518-528 - [c14]Logan Morrison, Huw Read, Konstantinos Xynos, Iain Sutherland:
Forensic Evaluation of an Amazon Fire TV Stick. IFIP Int. Conf. Digital Forensics 2017: 63-79 - 2016
- [c13]Huw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos, Mikhaila Burgess:
A Forensic Methodology for Analyzing Nintendo 3DS Devices. IFIP Int. Conf. Digital Forensics 2016: 127-143 - 2015
- [j16]Matthew Davies, Huw Read, Konstantinos Xynos, Iain Sutherland:
Forensic analysis of a Sony PlayStation 4: A first look. Digit. Investig. 12 Supplement 1: S81-S89 (2015) - [j15]Huw Read, Iain Sutherland, Konstantinos Xynos, Frode Roarson:
Locking Out the Investigator: The Need to Circumvent Security in Embedded Systems. Inf. Secur. J. A Glob. Perspect. 24(1-3): 39-47 (2015) - [c12]Huw Read, Konstantinos Xynos, Iain Sutherland, Frode Roarson, Panagiotis Andriotis, George C. Oikonomou:
An Extensible Platform for the Forensic Analysis of Social Media Data. HCI (22) 2015: 404-414 - [c11]Iain Sutherland, Theodoros Spyridopoulos, Huw Read, Andy Jones, Graeme Sutherland, Mikhailia Burgess:
Applying the ACPO Guidelines to Building Automation Systems. HCI (22) 2015: 684-692 - 2014
- [j14]Iain Sutherland, Huw Read, Konstantinos Xynos:
Forensic analysis of smart TV: A current issue and call to arms. Digit. Investig. 11(3): 175-178 (2014) - 2013
- [j13]Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth:
Manipulation of hard drive firmware to conceal entire partitions. Digit. Investig. 10(4): 281-286 (2013) - [c10]Anthony Benham, Huw Read, Iain Sutherland:
Network Attack Analysis and the Behaviour Engine. AINA 2013: 106-113 - 2011
- [j12]Iain Sutherland, Gareth Davies, Andrew Blyth:
Malware and steganography in hard disk firmware. J. Comput. Virol. 7(3): 215-219 (2011) - 2010
- [j11]Konstantinos Xynos, Simon Harries, Iain Sutherland, Gareth Davies, Andrew Blyth:
Xbox 360: A digital forensic investigation of the hard disk drive. Digit. Investig. 6(3-4): 104-111 (2010) - [j10]Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies:
The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. J. Digit. Forensics Secur. Law 5(4): 43-64 (2010) - [c9]Noor Hashim, Iain Sutherland:
An Architecture for the Forensic Analysis of Windows System Artifacts. ICDF2C 2010: 120-128
2000 – 2009
- 2009
- [j9]Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth:
The Impact of Hard Disk Firmware Steganography on Computer Forensics. J. Digit. Forensics Secur. Law 4(2): 73-84 (2009) - [c8]Huw Read, Andrew Blyth, Iain Sutherland:
A Unified Approach to Network Traffic and Network Security Visualisation. ICC 2009: 1-6 - 2008
- [j8]Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland:
The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. J. Digit. Forensics Secur. Law 3(1): 5-24 (2008) - [j7]Andy Jones, Craig Valli, Iain Sutherland:
Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market. J. Digit. Forensics Secur. Law 3(2): 55-70 (2008) - 2007
- [j6]Theodore Tryfonas, Iain Sutherland, Ioannis Pompogiatzis:
Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples. Internet Res. 17(1): 61-87 (2007) - 2006
- [j5]Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley:
An empirical examination of the reverse engineering process for binary files. Comput. Secur. 25(3): 221-228 (2006) - [j4]Vivienne Mee, Theodore Tryfonas, Iain Sutherland:
The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage. Digit. Investig. 3(3): 166-173 (2006) - [j3]Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas:
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. J. Digit. Forensics Secur. Law 1(3): 23-36 (2006) - 2005
- [c7]Vivienne Mee, Iain Sutherland:
Windows Event Logs and Their Forensic Usefulness. ECIW 2005: 225-238 - [c6]Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas:
Distribution of Offensive Material Over Computer Networks: A Research Agenda. ECIW 2005: 355-362 - 2003
- [j2]Andrew Blyth, Daniel Cunliffe, Iain Sutherland:
Security analysis of XML usage and XML parsing. Comput. Secur. 22(6): 494-505 (2003) - 2002
- [c5]Andrew Blyth, Daniel Cunliffe, Iain Sutherland:
XEON - An Architecture for an XML Enabled Firewall. ICEIS 2002: 1111-1116 - 2001
- [j1]Suzanne M. Embury, Sue M. Brandt, John S. Robinson, Iain Sutherland, Frank A. Bisby, W. A. Gray, Andrew C. Jones, Richard J. White:
Adapting integrity enforcement techniques for data reconciliation. Inf. Syst. 26(8): 657-689 (2001) - 2000
- [c4]Iain Sutherland, John S. Robinson, Sue M. Brandt, Andrew C. Jones, Suzanne M. Embury, W. A. Gray, Richard J. White, Frank A. Bisby:
Assisting the Integration of Taxonomic Data: The LITCHI Toolkit. ICDE 2000: 679-680 - [c3]Andrew C. Jones, Iain Sutherland, Suzanne M. Embury, W. A. Gray, Richard J. White, John S. Robinson, Frank A. Bisby, Sue M. Brandt:
Techniques for Effective Integration, Maintenance and Evolution of Species Databases. SSDBM 2000: 3-13
1990 – 1999
- 1999
- [c2]Suzanne M. Embury, Andrew C. Jones, Iain Sutherland, W. A. Gray, Richard J. White, John S. Robinson, Frank A. Bisby, Sue M. Brandt:
Conflict Detection for Integration of Taxonomic Data Sources. SSDBM 1999: 204-213 - [c1]Iain Sutherland, Suzanne M. Embury, Andrew C. Jones, W. A. Gray, Richard J. White, John S. Robinson, Frank A. Bisby, Sue M. Brandt:
LITCHI: Knowledge Integrity Testing for Taxonomic Databases. SSDBM 1999: 278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint