Calm before the storm: The challenges of cloud computing in digital forensics G Grispos, T Storer, WB Glisson International Journal of Digital Crime and Forensics (IJDCF) 4 (2), 28-48, 2012 | 227 | 2012 |
Forensic-by-design framework for cyber-physical cloud systems NH Ab Rahman, WB Glisson, Y Yang, KKR Choo IEEE Cloud Computing 3 (1), 50-59, 2016 | 206 | 2016 |
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014 | 102 | 2014 |
A comparison of forensic evidence recovery techniques for a windows mobile smart phone G Grispos, T Storer, WB Glisson Digital Investigation 8 (1), 23-36, 2011 | 100 | 2011 |
Using smartphones as a proxy for forensic evidence contained in cloud storage services G Grispos, WB Glisson, T Storer 2013 46th Hawaii international conference on system sciences, 4910-4919, 2013 | 88 | 2013 |
Implications of malicious 3D printer firmware SB Moore, WB Glisson, M Yampolskiy Proceedings of the 50th Hawaii International Conference on System Sciences, 2017 | 81 | 2017 |
Medical cyber-physical systems development: A forensics-driven approach G Grispos, WB Glisson, KKR Choo 2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017 | 79 | 2017 |
Investigating the increase in mobile phone evidence in criminal activities JER McMillan, WB Glisson, M Bromby 2013 46th Hawaii international conference on system sciences, 4900-4909, 2013 | 76 | 2013 |
Electronic retention: what does your mobile phone reveal about you? WB Glisson, T Storer, G Mayall, I Moug, G Grispos International Journal of Information Security 10, 337-349, 2011 | 58 | 2011 |
CDBFIP: Common database forensic investigation processes for Internet of Things A Al-Dhaqm, S Razak, SH Othman, KKR Choo, WB Glisson, A Ali, M Abrar IEEE Access 5, 24401-24416, 2017 | 57 | 2017 |
The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps NDW Cahyani, NHA Rahman, WB Glisson, KKR Choo Mobile Networks and Applications 22, 240-254, 2017 | 45 | 2017 |
The cloud security ecosystem: technical, legal, business and management issues R Choo, R Ko Syngress, 2015 | 45 | 2015 |
Machine learning-based android malware detection using manifest permissions N Herron, WB Glisson, JT McDonald, RK Benton Proceedings of the 54th Hawaii International Conference on System Sciences, 2021 | 44 | 2021 |
Recovering residual forensic data from smartphone interactions with cloud storage providers G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1506.02268, 2015 | 43 | 2015 |
Android anti-forensics: Modifying cyanogenmod KJ Karlsson, WB Glisson 2014 47th Hawaii International Conference on System Sciences, 4828-4837, 2014 | 41 | 2014 |
A malicious attack on the machine learning policy of a robotic system G Clark, M Doran, W Glisson 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 39 | 2018 |
Web development evolution: The assimilation of web engineering security WB Glisson, R Welland Third Latin American Web Congress (LA-WEB'2005), 5 pp., 2005 | 39 | 2005 |
Rethinking security incident response: The integration of agile principles G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1408.2431, 2014 | 38 | 2014 |
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1306.2477, 2013 | 37 | 2013 |
Security incident response criteria: A practitioner's perspective G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1508.02526, 2015 | 36 | 2015 |