The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Iain Sutherland: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vivienne Mee, Iain Sutherland
    Windows Event Logs and Their Forensic Usefulness. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:225-238 [Conf]
  2. Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas
    Distribution of Offensive Material Over Computer Networks: A Research Agenda. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:355-362 [Conf]
  3. Iain Sutherland, John S. Robinson, Sue M. Brandt, Andrew C. Jones, Suzanne M. Embury, W. A. Gray, Richard J. White, Frank A. Bisby
    Assisting the Integration of Taxonomic Data: The LITCHI Toolkit. [Citation Graph (0, 0)][DBLP]
    ICDE, 2000, pp:679-680 [Conf]
  4. Andrew Blyth, Daniel Cunliffe, Iain Sutherland
    XEON - An Architecture for an XML Enabled Firewall. [Citation Graph (0, 0)][DBLP]
    ICEIS, 2002, pp:1111-1116 [Conf]
  5. Suzanne M. Embury, Andrew C. Jones, Iain Sutherland, W. A. Gray, Richard J. White, John S. Robinson, Frank A. Bisby, Sue M. Brandt
    Conflict Detection for Integration of Taxonomic Data Sources. [Citation Graph (0, 0)][DBLP]
    SSDBM, 1999, pp:204-213 [Conf]
  6. Andrew C. Jones, Iain Sutherland, Suzanne M. Embury, W. A. Gray, Richard J. White, John S. Robinson, Frank A. Bisby, Sue M. Brandt
    Techniques for Effective Integration, Maintenance and Evolution of Species Databases. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2000, pp:3-13 [Conf]
  7. Iain Sutherland, Suzanne M. Embury, Andrew C. Jones, W. A. Gray, Richard J. White, John S. Robinson, Frank A. Bisby, Sue M. Brandt
    LITCHI: Knowledge Integrity Testing for Taxonomic Databases. [Citation Graph (0, 0)][DBLP]
    SSDBM, 1999, pp:278- [Conf]
  8. Andrew Blyth, Daniel Cunliffe, Iain Sutherland
    Security analysis of XML usage and XML parsing. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:494-505 [Journal]
  9. Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley
    An empirical examination of the reverse engineering process for binary files. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:3, pp:221-228 [Journal]
  10. Vivienne Mee, Theodore Tryfonas, Iain Sutherland
    The Windows Registry as a forensic artefact: Illustrating evidence collection for Internet usage. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:3, pp:166-173 [Journal]
  11. Suzanne M. Embury, Sue M. Brandt, John S. Robinson, Iain Sutherland, Frank A. Bisby, W. A. Gray, Andrew C. Jones, Richard J. White
    Adapting integrity enforcement techniques for data reconciliation. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2001, v:26, n:8, pp:657-689 [Journal]

  12. A Unified Approach to Network Traffic and Network Security Visualisation. [Citation Graph (, )][DBLP]


  13. Xbox 360: A digital forensic investigation of the hard disk drive. [Citation Graph (, )][DBLP]


Search in 0.015secs, Finished in 0.016secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002