Analysis of android malware detection techniques: a systematic review MA Ashawa, S Morris Society of Digital Information and Wireless Communications, 2019 | 34 | 2019 |
Analysis of mobile malware: a systematic review of evolution and infection strategies M Ashawa, S Morris جامعة نايف العربية للعلوم الأمنية, 2021 | 15 | 2021 |
Sifting through the ashes: Amazon Fire TV stick acquisition and analysis M Hadgkiss, S Morris, S Paget Digital investigation 28, 112-118, 2019 | 12 | 2019 |
An analysis of the structure and behaviour of the Windows 7 operating system thumbnail cache S Morris, H Chivers University of Strathclyde, Glasgow, 2011 | 8 | 2011 |
Android Permission Classifier: a deep learning algorithmic framework based on protection and threat levels M Ashawa, S Morris Security and Privacy 4 (5), e164, 2021 | 7 | 2021 |
A two-stage model for social network investigations in digital forensics A David, S Morris, G Appleby-Thomas Journal of Digital Forensics, Security and Law 15 (2), 1, 2020 | 7 | 2020 |
Modeling correlation between android permissions based on threat and protection level using exploratory factor plane analysis M Ashawa, S Morris Journal of Cybersecurity and Privacy 1 (4), 704-742, 2021 | 6 | 2021 |
Host-based detection and analysis of android malware: Implication for privilege exploitation M Ashawa, S Morris prevalence 8 (9), 10-11, 2019 | 6 | 2019 |
Purple dawn: Dead disk forensics on Google's Fuchsia operating system M Jarrett, S Morris Forensic Science International: Digital Investigation 39, 301269, 2021 | 5 | 2021 |
An Investigation into the identification, reconstruction, and evidential value of thumbnail cache file fragments in unallocated space SLA Morris | 5 | 2013 |
A critical comparison of Brave Browser and Google Chrome forensic artefacts S Berham, S Morris Journal of Digital Forensics, Security and Law 17 (1), 4, 2022 | 4 | 2022 |
A comparative study of the structure and behaviour of the operating system thumbnail caches used in Kubuntu and Ubuntu (9.10 and 10.04) S Morris, H Chivers Proc. of the 4th Cybercrime Forensics Education & Training. Canterbury …, 2010 | 4 | 2010 |
Virtual Crime: Forensic Artefacts from Second Life S Morris 6th Cybercrime Forensics Education & Training, 2012 | 3 | 2012 |
Forming a Relationship between Artefacts identified in thumbnail caches and the remaining data on a storage device S Morris, H Chivers Cybercrime Forensics Education and Training, 2011 | 3 | 2011 |
We're making a list and we're checking it twice, gonna find out what makes digital forensic examiners suffice S Morris, M Hadgkiss, A David, J Guinness, C Frewin Wiley Interdisciplinary Reviews: Forensic Science 5 (5), e1487, 2023 | 2 | 2023 |
Analysis of mobile malware, evolution and infection strategies: A systematic review M Ashawa, S Morris NAUSS, 2021 | 2 | 2021 |
Social media user relationship framework (SMURF) A David, S Morris, G Appleby-Thomas Journal of Digital Forensics, Security and Law 16 (1), 1, 2021 | 1 | 2021 |
Keystroke inference using smartphone kinematics O Buckley, D Hodges, M Hadgkiss, S Morris Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017 | 1 | 2017 |
A Principal’s Role in a Teacher’s Journey T Cole, S Morris Academic Exchange Quarterly, 2015 | 1 | 2015 |
Cheap as chips: An accessible chip off acquisition method for ball grid array (BGA) integrated circuits in digital investigations M Hadgkiss, S Morris, S Paget, A Ventress, K Norris Forensic Science International: Digital Investigation 42, 301481, 2022 | | 2022 |