Tim Storer
Tim Storer
Senior Lecturer in Software Engineering, School of Computing Science, University of Glasgow
Email verificata su glasgow.ac.uk
Titolo
Citata da
Citata da
Anno
Calm before the storm: The challenges of cloud computing in digital forensics
G Grispos, T Storer, WB Glisson
International Journal of Digital Crime and Forensics (IJDCF) 4 (2), 28-48, 2012
1722012
A framework for continuous, transparent mobile device authentication
H Crawford, K Renaud, T Storer
Computers & Security 39, 127-136, 2013
1152013
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
G Grispos, T Storer, WB Glisson
Digital Investigation 8 (1), 23-36, 2011
792011
Using smartphones as a proxy for forensic evidence contained in cloud storage services
G Grispos, WB Glisson, T Storer
2013 46th Hawaii international conference on system sciences, 4910-4919, 2013
732013
Electronic retention: what does your mobile phone reveal about you?
WB Glisson, T Storer, G Mayall, I Moug, G Grispos
International Journal of Information Security 10 (6), 337, 2011
482011
Deriving information requirements from responsibility models
I Sommerville, R Lock, T Storer, J Dobson
International Conference on Advanced Information Systems Engineering, 515-529, 2009
482009
Bridging the chasm: A survey of software engineering practice in scientific programming
T Storer
ACM Computing Surveys (CSUR) 50 (4), 1-32, 2017
362017
Recovering residual forensic data from smartphone interactions with cloud storage providers
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1506.02268, 2015
302015
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1306.2477, 2013
292013
Responsibility modelling for civil emergency planning
I Sommerville, T Storer, R Lock
Risk Management 11 (3), 179-207, 2009
242009
An empirical comparison of data recovered from mobile forensic toolkits
WB Glisson, T Storer, J Buchanan-Wollaston
Digital Investigation 10 (1), 44-55, 2013
232013
Responsibility modelling for risk analysis
R Lock, T Storer, I Sommerville
222009
Polsterless remote electronic voting
T Storer, I Duncan
Journal of E-government 1 (1), 75-103, 2004
222004
Rethinking security incident response: The integration of agile principles
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1408.2431, 2014
212014
Investigating information security risks of mobile device use within organizations
WB Glisson, T Storer
arXiv preprint arXiv:1309.0521, 2013
202013
Security incident response criteria: A practitioner's perspective
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1508.02526, 2015
182015
An exploratory study of voter attitudes towards a pollsterless remote voting system
T Storer, L Little, I Duncan
IaVoSS Workshop on Trustworthy Elections (WOTE 06) Pre-Proceedings, 77-86, 2006
172006
A cyber exercise post assessment: adoption of the Kirkpatrick model
A Ahmad, C Johnson, T Storer
Advances in Information Sciences and Service Sciences 7 (2), 1, 2015
162015
Information requirements for enterprise systems
I Sommerville, R Lock, T Storer
Monterey Workshop, 266-282, 2012
162012
Practical Remote Electronic Elections for the UK.
T Storer, I Duncan
PST, 41-45, 2004
162004
Il sistema al momento non pu eseguire l'operazione. Riprova pi tardi.
Articoli 1–20