Follow
William Bradley Glisson
Title
Cited by
Cited by
Year
Calm before the storm: The challenges of cloud computing in digital forensics
G Grispos, T Storer, WB Glisson
International Journal of Digital Crime and Forensics (IJDCF) 4 (2), 28-48, 2012
2272012
Forensic-by-design framework for cyber-physical cloud systems
NH Ab Rahman, WB Glisson, Y Yang, KKR Choo
IEEE Cloud Computing 3 (1), 50-59, 2016
2062016
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
1022014
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
G Grispos, T Storer, WB Glisson
Digital Investigation 8 (1), 23-36, 2011
1002011
Using smartphones as a proxy for forensic evidence contained in cloud storage services
G Grispos, WB Glisson, T Storer
2013 46th Hawaii international conference on system sciences, 4910-4919, 2013
882013
Implications of malicious 3D printer firmware
SB Moore, WB Glisson, M Yampolskiy
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
812017
Medical cyber-physical systems development: A forensics-driven approach
G Grispos, WB Glisson, KKR Choo
2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017
792017
Investigating the increase in mobile phone evidence in criminal activities
JER McMillan, WB Glisson, M Bromby
2013 46th Hawaii international conference on system sciences, 4900-4909, 2013
762013
Electronic retention: what does your mobile phone reveal about you?
WB Glisson, T Storer, G Mayall, I Moug, G Grispos
International Journal of Information Security 10, 337-349, 2011
582011
CDBFIP: Common database forensic investigation processes for Internet of Things
A Al-Dhaqm, S Razak, SH Othman, KKR Choo, WB Glisson, A Ali, M Abrar
IEEE Access 5, 24401-24416, 2017
572017
The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps
NDW Cahyani, NHA Rahman, WB Glisson, KKR Choo
Mobile Networks and Applications 22, 240-254, 2017
452017
The cloud security ecosystem: technical, legal, business and management issues
R Choo, R Ko
Syngress, 2015
452015
Machine learning-based android malware detection using manifest permissions
N Herron, WB Glisson, JT McDonald, RK Benton
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
442021
Recovering residual forensic data from smartphone interactions with cloud storage providers
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1506.02268, 2015
432015
Android anti-forensics: Modifying cyanogenmod
KJ Karlsson, WB Glisson
2014 47th Hawaii International Conference on System Sciences, 4828-4837, 2014
412014
A malicious attack on the machine learning policy of a robotic system
G Clark, M Doran, W Glisson
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
392018
Web development evolution: The assimilation of web engineering security
WB Glisson, R Welland
Third Latin American Web Congress (LA-WEB'2005), 5 pp., 2005
392005
Rethinking security incident response: The integration of agile principles
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1408.2431, 2014
382014
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1306.2477, 2013
372013
Security incident response criteria: A practitioner's perspective
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1508.02526, 2015
362015
The system can't perform the operation now. Try again later.
Articles 1–20