Themes
Learning and Multimedia TechnologiesSoftware Engineering and DesignTopics
Security and Policing, Forensics and Privacy
We will do all we can to make sure that the relationship that you have with The Open University is a positive one.
We will do all we can to treat you as an individual, whether you are contacting to give us some good news or to raise a problem. Please also be assured that we will not share, sell or give your details to anyone.
[contact-form]
Lecturer in Cyber Security
forensics, malware, security, IoT, ics, police
Donnachie, Benjamin, Verrall, Jason, Hopgood, Adrian, Wong, Patrick and Kennedy, Ian ,(2022). Accelerating Cyber-Breach Investigations through Novel use of Artificial Immune System Algorithms. In: Artificial Intelligence XXXIX: 42nd SGAI International Conference on Artificial Intelligence. Lecture Notes in Computer Science, 13-15 Dec 2022, Cambridge, UK.
Neale, Chris, Kennedy, Ian, Price, Blaine, Yu, Yijun and Nuseibeh, Bashar ,(2022). The case for Zero Trust Digital Forensics. Forensic Science International: Digital Investigation, 40
Kennedy, Ian and Day, Ed ,(2016). Chapter 8 Digital Forensic Analysis. In: Bryant, Robin and Bryant, Sarah eds. Policing Digital Crime. Farnham, Surrey, UK: Ashgate, pp. 161â185.
Bryant, Robin and Kennedy, Ian ,(2016). Chapter 6 Investigating digital crime. In: Bryant, Robin and Bryant, Sarah eds. Policing Digital Crime. Farnham, Surrey, UK: Ashgate, pp. 123â145.
Kennedy, Ian and Day, Ed ,(2016). Chapter 7 - Procedures at Digital Crime Scenes. In: Bryant, Robin and Bryant, Sarah eds. Policing Digital Crime. Farnham, Surrey, UK: Ashgate, pp. 147â160.
Kennedy, Ian ,(2006). Looking for foul play - digital forensics Part 2. The Chartered Institute for IT.
Kennedy, Ian ,(2006). The electronic autopsy - digital forensics Part 1. The Chartered Institute for IT.
Security and Policing, Forensics and Privacy