Calm before the storm: The challenges of cloud computing in digital forensics G Grispos, T Storer, WB Glisson International Journal of Digital Crime and Forensics (IJDCF) 4 (2), 28-48, 2012 | 234* | 2012 |
A comparison of forensic evidence recovery techniques for a windows mobile smart phone G Grispos, T Storer, WB Glisson Digital Investigation 8 (1), 23-36, 2011 | 99 | 2011 |
Using smartphones as a proxy for forensic evidence contained in cloud storage services G Grispos, WB Glisson, T Storer The 46th Hawaii International Conference on System Sciences (HICSS 2013 …, 2013 | 90 | 2013 |
Medical cyber-physical systems development: A forensics-driven approach G Grispos, WB Glisson, KKR Choo 2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017 | 80 | 2017 |
Electronic retention: what does your mobile phone reveal about you? WB Glisson, T Storer, G Mayall, I Moug, G Grispos International Journal of Information Security 10, 337-349, 2011 | 57 | 2011 |
Recovering residual forensic data from smartphone interactions with cloud storage providers G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1506.02268, 2015 | 43 | 2015 |
Are you dating danger? An interdisciplinary approach to evaluating the (in) security of android dating apps R Shetty, G Grispos, KKR Choo IEEE Transactions on Sustainable Computing 6 (2), 197-207, 2017 | 41 | 2017 |
Digital forensics subdomains: the state of the art and future directions A Al-Dhaqm, RA Ikuesan, VR Kebande, S Abd Razak, G Grispos, ... IEEE Access 9, 152476-152502, 2021 | 40 | 2021 |
Rethinking security incident response: The integration of agile principles G Grispos, WB Glisson, T Storer 20th Americas Conference on Information Systems (AMCIS 2014), 2014 | 38 | 2014 |
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization G Grispos, WB Glisson, T Storer The 21st European Conference on Information Systems (ECIS 2013), Utrecht …, 2013 | 37 | 2013 |
Security incident response criteria: A practitioner's perspective G Grispos, WB Glisson, T Storer 21st Americas Conference on Information Systems (AMCIS 2015), 2015 | 34 | 2015 |
Knock! knock! who is there? investigating data leakage from a medical internet of things hijacking attack T Flynn, G Grispos, W Glisson, W Mahoney 53rd Hawaii International Conference on System Sciences (HICSS-53), 2020 | 31 | 2020 |
How good is your data? Investigating the quality of data generated during security incident response investigations G Grispos, WB Glisson, T Storer 52nd Hawaii International Conference on System Sciences (HICSS-52), 2019 | 31 | 2019 |
Enhancing security incident response follow-up efforts with lightweight agile retrospectives G Grispos, WB Glisson, T Storer Digital Investigation 22, 62-73, 2017 | 29 | 2017 |
Identifying user behavior from residual data in cloud-based synchronized apps G Grispos, WB Glisson, JH Pardue, M Dickson Conference on Information Systems Applied Research (CONISAR 2014), 2014 | 27 | 2014 |
Are you ready? Towards the engineering of forensic-ready systems G Grispos, J García-Galán, L Pasquale, B Nuseibeh 2017 11th International Conference on Research Challenges in Information …, 2017 | 26 | 2017 |
On the enhancement of data quality in security incident response investigations G Grispos University of Glasgow, 2016 | 21 | 2016 |
Cyber autopsies: The integration of digital forensics into medical contexts G Grispos, K Bastola 2020 IEEE 33rd International Symposium on Computer-Based Medical Systems …, 2020 | 18 | 2020 |
Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed H Studiawan, G Grispos, KKR Choo Computers & Security 2023 (103340), 1-13, 2023 | 17 | 2023 |
Criminals: Cybercriminals G Grispos Encyclopedia of Security and Emergency Management, 84-89, 2021 | 15 | 2021 |