Follow
William Bradley Glisson
Title
Cited by
Cited by
Year
Calm before the storm: The challenges of cloud computing in digital forensics
G Grispos, T Storer, WB Glisson
International Journal of Digital Crime and Forensics (IJDCF) 4 (2), 28-48, 2012
2212012
Forensic-by-design framework for cyber-physical cloud systems
NH Ab Rahman, WB Glisson, Y Yang, KKR Choo
IEEE Cloud Computing 3 (1), 50-59, 2016
1952016
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
G Grispos, T Storer, WB Glisson
Digital Investigation 8 (1), 23-36, 2011
992011
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
982014
Using smartphones as a proxy for forensic evidence contained in cloud storage services
G Grispos, WB Glisson, T Storer
2013 46th Hawaii international conference on system sciences, 4910-4919, 2013
882013
Implications of malicious 3D printer firmware
SB Moore, WB Glisson, M Yampolskiy
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
772017
Investigating the increase in mobile phone evidence in criminal activities
JER McMillan, WB Glisson, M Bromby
2013 46th Hawaii international conference on system sciences, 4900-4909, 2013
762013
Medical cyber-physical systems development: A forensics-driven approach
G Grispos, WB Glisson, KKR Choo
2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017
712017
Electronic retention: what does your mobile phone reveal about you?
WB Glisson, T Storer, G Mayall, I Moug, G Grispos
International Journal of Information Security 10, 337-349, 2011
542011
CDBFIP: Common database forensic investigation processes for Internet of Things
A Al-Dhaqm, S Razak, SH Othman, KKR Choo, WB Glisson, A Ali, M Abrar
IEEE Access 5, 24401-24416, 2017
532017
The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps
NDW Cahyani, NHA Rahman, WB Glisson, KKR Choo
Mobile Networks and Applications 22, 240-254, 2017
452017
Recovering residual forensic data from smartphone interactions with cloud storage providers
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1506.02268, 2015
432015
The cloud security ecosystem: technical, legal, business and management issues
R Choo, R Ko
Syngress, 2015
432015
Android anti-forensics: Modifying cyanogenmod
KJ Karlsson, WB Glisson
2014 47th Hawaii International Conference on System Sciences, 4828-4837, 2014
402014
Investigating the Impact of Global Positioning System Evidence
KJ Berman, WB Glisson, LM Glisson
392015
Web development evolution: The assimilation of web engineering security
WB Glisson, R Welland
Third Latin American Web Congress (LA-WEB'2005), 5 pp., 2005
392005
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1306.2477, 2013
382013
A malicious attack on the machine learning policy of a robotic system
G Clark, M Doran, W Glisson
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
372018
Rethinking security incident response: The integration of agile principles
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1408.2431, 2014
372014
Machine learning-based android malware detection using manifest permissions
N Herron, WB Glisson, JT McDonald, RK Benton
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
362021
The system can't perform the operation now. Try again later.
Articles 1–20