William Bradley Glisson
Cited by
Cited by
Calm before the storm: The challenges of cloud computing in digital forensics
G Grispos, T Storer, WB Glisson
International Journal of Digital Crime and Forensics (IJDCF) 4 (2), 28-48, 2012
Forensic-by-design framework for cyber-physical cloud systems
NH Ab Rahman, WB Glisson, Y Yang, KKR Choo
IEEE Cloud Computing 3 (1), 50-59, 2016
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
G Grispos, T Storer, WB Glisson
Digital Investigation 8 (1), 23-36, 2011
Using smartphones as a proxy for forensic evidence contained in cloud storage services
G Grispos, WB Glisson, T Storer
2013 46th Hawaii international conference on system sciences, 4910-4919, 2013
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
Investigating the increase in mobile phone evidence in criminal activities
JER McMillan, WB Glisson, M Bromby
2013 46th Hawaii International Conference on System Sciences, 4900-4909, 2013
Electronic retention: what does your mobile phone reveal about you?
WB Glisson, T Storer, G Mayall, I Moug, G Grispos
International Journal of Information Security 10 (6), 337, 2011
Implications of malicious 3D printer firmware
SB Moore, WB Glisson, M Yampolskiy
Medical cyber-physical systems development: A forensics-driven approach
G Grispos, WB Glisson, KKR Choo
2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017
Recovering residual forensic data from smartphone interactions with cloud storage providers
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1506.02268, 2015
Web development evolution: The assimilation of web engineering security
WB Glisson, R Welland
Third Latin American Web Congress (LA-WEB'2005), 5 pp., 2005
The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps
NDW Cahyani, NH Ab Rahman, WB Glisson, KKR Choo
Mobile Networks and Applications 22 (2), 240-254, 2017
Investigating the Impact of Global Positioning System Evidence
KJ Berman, WB Glisson, LM Glisson
Android anti-forensics: Modifying cyanogenmod
KJ Karlsson, WB Glisson
2014 47th Hawaii International Conference on System Sciences, 4828-4837, 2014
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1306.2477, 2013
Compromising a Medical Mannequin
T Andel, M Campbell, W Glisson, M Jacobs, J Mayr, J McDonald
Attack-graph threat modeling assessment of ambulatory medical devices
P Luckett, JT McDonald, WB Glisson
arXiv preprint arXiv:1709.05026, 2017
Identifying user behavior from residual data in cloud-based synchronized apps
G Grispos, WB Glisson, JH Pardue, M Dickson
arXiv preprint arXiv:1411.2132, 2014
Rethinking security incident response: The integration of agile principles
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1408.2431, 2014
An empirical comparison of data recovered from mobile forensic toolkits
WB Glisson, T Storer, J Buchanan-Wollaston
Digital Investigation 10 (1), 44-55, 2013
The system can't perform the operation now. Try again later.
Articles 1–20