William Bradley Glisson
Title
Cited by
Cited by
Year
Calm before the storm: The challenges of cloud computing in digital forensics
G Grispos, T Storer, WB Glisson
International Journal of Digital Crime and Forensics (IJDCF) 4 (2), 28-48, 2012
1842012
Forensic-by-design framework for cyber-physical cloud systems
NH Ab Rahman, WB Glisson, Y Yang, KKR Choo
IEEE Cloud Computing 3 (1), 50-59, 2016
1472016
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
G Grispos, T Storer, WB Glisson
Digital Investigation 8 (1), 23-36, 2011
832011
Using smartphones as a proxy for forensic evidence contained in cloud storage services
G Grispos, WB Glisson, T Storer
2013 46th Hawaii international conference on system sciences, 4910-4919, 2013
772013
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
692014
Investigating the increase in mobile phone evidence in criminal activities
JER McMillan, WB Glisson, M Bromby
2013 46th Hawaii International Conference on System Sciences, 4900-4909, 2013
642013
Electronic retention: what does your mobile phone reveal about you?
WB Glisson, T Storer, G Mayall, I Moug, G Grispos
International Journal of Information Security 10 (6), 337, 2011
492011
Implications of malicious 3D printer firmware
SB Moore, WB Glisson, M Yampolskiy
452017
Medical cyber-physical systems development: A forensics-driven approach
G Grispos, WB Glisson, KKR Choo
2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017
382017
Recovering residual forensic data from smartphone interactions with cloud storage providers
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1506.02268, 2015
352015
Web development evolution: The assimilation of web engineering security
WB Glisson, R Welland
Third Latin American Web Congress (LA-WEB'2005), 5 pp., 2005
352005
The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps
NDW Cahyani, NH Ab Rahman, WB Glisson, KKR Choo
Mobile Networks and Applications 22 (2), 240-254, 2017
342017
Investigating the Impact of Global Positioning System Evidence
KJ Berman, WB Glisson, LM Glisson
332015
Android anti-forensics: Modifying cyanogenmod
KJ Karlsson, WB Glisson
2014 47th Hawaii International Conference on System Sciences, 4828-4837, 2014
332014
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1306.2477, 2013
312013
Compromising a Medical Mannequin
T Andel, M Campbell, W Glisson, M Jacobs, J Mayr, J McDonald
25*2015
Attack-graph threat modeling assessment of ambulatory medical devices
P Luckett, JT McDonald, WB Glisson
arXiv preprint arXiv:1709.05026, 2017
232017
Identifying user behavior from residual data in cloud-based synchronized apps
G Grispos, WB Glisson, JH Pardue, M Dickson
arXiv preprint arXiv:1411.2132, 2014
232014
Rethinking security incident response: The integration of agile principles
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1408.2431, 2014
232014
An empirical comparison of data recovered from mobile forensic toolkits
WB Glisson, T Storer, J Buchanan-Wollaston
Digital Investigation 10 (1), 44-55, 2013
232013
The system can't perform the operation now. Try again later.
Articles 1–20