BibTeX records: George Grispos

download as .bib file

@article{DBLP:journals/access/MearsDG25,
  author       = {Logan Mears and
                  Rachel Donner and
                  George Grispos},
  title        = {Old MacDonald and His Hackable Smartphone Application: {A} Security
                  and Privacy Analysis of Android Agriculture Applications},
  journal      = {{IEEE} Access},
  volume       = {13},
  pages        = {114216--114229},
  year         = {2025},
  url          = {https://doi.org/10.1109/ACCESS.2025.3584673},
  doi          = {10.1109/ACCESS.2025.3584673},
  timestamp    = {Sat, 09 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MearsDG25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/FarjadPKGG25,
  author       = {Sheikh Muhammad Farjad and
                  Sandeep Reddy Patllola and
                  Yonas Kassa and
                  George Grispos and
                  Robin Gandhi},
  title        = {Secure Edge Computing Reference Architecture for Data-driven Structural
                  Health Monitoring: Lessons Learned from Implementation and Benchmarking},
  booktitle    = {Proceedings of the 2025 {ACM} Southeast Conference, {ACMSE} 2025,
                  Southeast Missouri State University, Cape Girardeau, MO, USA, April
                  24-26, 2025},
  pages        = {145--154},
  publisher    = {{ACM}},
  year         = {2025},
  url          = {https://doi.org/10.1145/3696673.3723074},
  doi          = {10.1145/3696673.3723074},
  timestamp    = {Wed, 11 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMse/FarjadPKGG25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2503-16283,
  author       = {Mark Freyhof and
                  George Grispos and
                  Santosh K. Pitla and
                  William Mahoney},
  title        = {Investigating The Implications of Cyberattacks Against Precision Agricultural
                  Equipment},
  journal      = {CoRR},
  volume       = {abs/2503.16283},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2503.16283},
  doi          = {10.48550/ARXIV.2503.16283},
  eprinttype    = {arXiv},
  eprint       = {2503.16283},
  timestamp    = {Mon, 14 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2503-16283.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2503-16292,
  author       = {George Grispos and
                  Logan Mears and
                  Larry Loucks and
                  William Mahoney},
  title        = {Cultivating Cybersecurity: Designing a Cybersecurity Curriculum for
                  the Food and Agriculture Sector},
  journal      = {CoRR},
  volume       = {abs/2503.16292},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2503.16292},
  doi          = {10.48550/ARXIV.2503.16292},
  eprinttype    = {arXiv},
  eprint       = {2503.16292},
  timestamp    = {Mon, 14 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2503-16292.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2503-18857,
  author       = {Sheikh Muhammad Farjad and
                  Sandeep Reddy Patllola and
                  Yonas Kassa and
                  George Grispos and
                  Robin Gandhi},
  title        = {Secure Edge Computing Reference Architecture for Data-driven Structural
                  Health Monitoring: Lessons Learned from Implementation and Benchmarking},
  journal      = {CoRR},
  volume       = {abs/2503.18857},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2503.18857},
  doi          = {10.48550/ARXIV.2503.18857},
  eprinttype    = {arXiv},
  eprint       = {2503.18857},
  timestamp    = {Sat, 19 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2503-18857.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2505-23800,
  author       = {George Grispos and
                  Logan Mears and
                  Larry Loucks},
  title        = {Strengthening Cybersecurity Resilience in Agriculture Through Educational
                  Interventions: {A} Case Study of the Ponca Tribe of Nebraska},
  journal      = {CoRR},
  volume       = {abs/2505.23800},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2505.23800},
  doi          = {10.48550/ARXIV.2505.23800},
  eprinttype    = {arXiv},
  eprint       = {2505.23800},
  timestamp    = {Sun, 29 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2505-23800.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrisposSA24,
  author       = {George Grispos and
                  Hudan Studiawan and
                  Saed Alrabaee},
  title        = {Internet of things (IoT) forensics and incident response: The good,
                  the bad, and the unaddressed},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {48},
  pages        = {301671},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301671},
  doi          = {10.1016/J.FSIDI.2023.301671},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GrisposSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StudiawanGC23,
  author       = {Hudan Studiawan and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Unmanned Aerial Vehicle {(UAV)} Forensics: The Good, The Bad, and
                  the Unaddressed},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103340},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103340},
  doi          = {10.1016/J.COSE.2023.103340},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StudiawanGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/GrisposCG23,
  author       = {George Grispos and
                  Kim{-}Kwang Raymond Choo and
                  William Bradley Glisson},
  title        = {Sickly Apps: {A} Forensic Analysis of Medical Device Smartphone Applications
                  on Android and iOS Devices},
  journal      = {Mob. Networks Appl.},
  volume       = {28},
  number       = {4},
  pages        = {1282--1292},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11036-022-02049-8},
  doi          = {10.1007/S11036-022-02049-8},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/GrisposCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/GlissonGM23,
  author       = {William Glisson and
                  George Grispos and
                  Jeffrey Todd McDonald},
  editor       = {Tung X. Bui},
  title        = {Introduction to the Minitrack on Cyber Operations, Defense, and Forensics},
  booktitle    = {56th Hawaii International Conference on System Sciences, {HICSS} 2023,
                  Maui, Hawaii, USA, January 3-6, 2023},
  pages        = {6601--6602},
  publisher    = {ScholarSpace},
  year         = {2023},
  url          = {https://hdl.handle.net/10125/103432},
  timestamp    = {Thu, 16 Feb 2023 16:52:47 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/GlissonGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/NashSGC23,
  author       = {Aleck Nash and
                  Hudan Studiawan and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Sanjay Goel and
                  Paulo Roberto Nunes de Souza},
  title        = {Security Analysis of Google Authenticator, Microsoft Authenticator,
                  and Authy},
  booktitle    = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference,
                  {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {571},
  pages        = {197--206},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56583-0\_13},
  doi          = {10.1007/978-3-031-56583-0\_13},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdf2c/NashSGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/GlissonGM22,
  author       = {William Glisson and
                  George Grispos and
                  Jeffrey Todd McDonald},
  title        = {Introduction to the Minitrack on Cyber Operations, Defence, and Forensics},
  booktitle    = {55th Hawaii International Conference on System Sciences, {HICSS} 2022,
                  Virtual Event / Maui, Hawaii, USA, January 4-7, 2022},
  pages        = {1--2},
  publisher    = {ScholarSpace},
  year         = {2022},
  url          = {http://hdl.handle.net/10125/80246},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/GlissonGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-05866,
  author       = {Mark Freyhof and
                  George Grispos and
                  Santosh K. Pitla and
                  Cody Stolle},
  title        = {Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments},
  journal      = {CoRR},
  volume       = {abs/2205.05866},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.05866},
  doi          = {10.48550/ARXIV.2205.05866},
  eprinttype    = {arXiv},
  eprint       = {2205.05866},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-05866.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-03607,
  author       = {George Grispos and
                  William R. Mahoney},
  title        = {Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the
                  Shipping Industry},
  journal      = {CoRR},
  volume       = {abs/2208.03607},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.03607},
  doi          = {10.48550/ARXIV.2208.03607},
  eprinttype    = {arXiv},
  eprint       = {2208.03607},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-03607.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Al-DhaqmIKRGCAA21,
  author       = {Arafat Al{-}Dhaqm and
                  Richard Adeyemi Ikuesan and
                  Victor R. Kebande and
                  Shukor Abd Razak and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo and
                  Bander Ali Saleh Al{-}Rimy and
                  Abdul Rahman A. Alsewari},
  title        = {Digital Forensics Subdomains: The State of the Art and Future Directions},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {152476--152502},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3124262},
  doi          = {10.1109/ACCESS.2021.3124262},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/Al-DhaqmIKRGCAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/ShettyGC21,
  author       = {Rushank Shetty and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Are You Dating Danger? An Interdisciplinary Approach to Evaluating
                  the (In)Security of Android Dating Apps},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {197--207},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSUSC.2017.2783858},
  doi          = {10.1109/TSUSC.2017.2783858},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/ShettyGC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fabulous/GrisposFGC21,
  author       = {George Grispos and
                  Talon Flynn and
                  William Bradley Glisson and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Dragan Perakovic and
                  Lucia Knapc{\'{\i}}kov{\'{a}}},
  title        = {Investigating Protected Health Information Leakage from Android Medical
                  Applications},
  booktitle    = {Future Access Enablers for Ubiquitous and Intelligent Infrastructures
                  - 5th {EAI} International Conference, {FABULOUS} 2021, Virtual Event,
                  May 6-7, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {382},
  pages        = {311--322},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78459-1\_23},
  doi          = {10.1007/978-3-030-78459-1\_23},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fabulous/GrisposFGC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ChooGG21,
  author       = {Kim{-}Kwang Raymond Choo and
                  George Grispos and
                  William Bradley Glisson},
  title        = {Introduction to the Minitrack on Cyber Operations, Defence, and Forensics},
  booktitle    = {54th Hawaii International Conference on System Sciences, {HICSS} 2021,
                  Kauai, Hawaii, USA, January 5, 2021},
  pages        = {1--2},
  publisher    = {ScholarSpace},
  year         = {2021},
  url          = {https://hdl.handle.net/10125/71454},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/ChooGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DelgadoGSMGB21,
  author       = {Alberto Alejandro Ceballos Delgado and
                  William Bradley Glisson and
                  Narasimha K. Shashidhar and
                  Jeffrey Todd McDonald and
                  George Grispos and
                  Ryan Benton},
  title        = {Deception Detection Using Machine Learning},
  booktitle    = {54th Hawaii International Conference on System Sciences, {HICSS} 2021,
                  Kauai, Hawaii, USA, January 5, 2021},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2021},
  url          = {https://hdl.handle.net/10125/71478},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/DelgadoGSMGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/JacomeSFG21,
  author       = {Ricardo O. Jacome and
                  Cody Stolle and
                  Ronald K. Faller and
                  George Grispos},
  editor       = {Toufik Ahmed and
                  Olivier Festor and
                  Yacine Ghamri{-}Doudane and
                  Joon{-}Myung Kang and
                  Alberto E. Schaeffer Filho and
                  Abdelkader Lahmadi and
                  Edmundo R. M. Madeira},
  title        = {A Dynamically-Concise Roadmap Framework for Guiding Connected and
                  Automated Vehicles},
  booktitle    = {17th {IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2021, Bordeaux, France, May 17-21, 2021},
  pages        = {1009--1017},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://ieeexplore.ieee.org/document/9464060},
  timestamp    = {Mon, 05 Jul 2021 08:04:03 +0200},
  biburl       = {https://dblp.org/rec/conf/im/JacomeSFG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GrisposTCMG21,
  author       = {George Grispos and
                  Frank Tursi and
                  Kim{-}Kwang Raymond Choo and
                  William Mahoney and
                  William Bradley Glisson},
  title        = {A Digital Forensics Investigation of a Smart Scale IoT Ecosystem},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {710--717},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00104},
  doi          = {10.1109/TRUSTCOM53373.2021.00104},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GrisposTCMG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-07360,
  author       = {George Grispos and
                  Talon Flynn and
                  William Bradley Glisson and
                  Kim{-}Kwang Raymond Choo},
  title        = {Investigating Protected Health Information Leakage from Android Medical
                  Applications},
  journal      = {CoRR},
  volume       = {abs/2105.07360},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.07360},
  eprinttype    = {arXiv},
  eprint       = {2105.07360},
  timestamp    = {Tue, 18 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-07360.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-05518,
  author       = {George Grispos and
                  Frank Tursi and
                  Kim{-}Kwang Raymond Choo and
                  William Mahoney and
                  William Bradley Glisson},
  title        = {A Digital Forensics Investigation of a Smart Scale IoT Ecosystem},
  journal      = {CoRR},
  volume       = {abs/2109.05518},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.05518},
  eprinttype    = {arXiv},
  eprint       = {2109.05518},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-05518.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbms/GrisposB20,
  author       = {George Grispos and
                  Kiran Bastola},
  editor       = {Alba Garc{\'{\i}}a Seco de Herrera and
                  Alejandro Rodr{\'{\i}}guez Gonz{\'{a}}lez and
                  KC Santosh and
                  Zelalem Temesgen and
                  Bridget Kane and
                  Paolo Soda},
  title        = {Cyber Autopsies: The Integration of Digital Forensics into Medical
                  Contexts},
  booktitle    = {33rd {IEEE} International Symposium on Computer-Based Medical Systems,
                  {CBMS} 2020, Rochester, MN, USA, July 28-30, 2020},
  pages        = {510--513},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CBMS49503.2020.00102},
  doi          = {10.1109/CBMS49503.2020.00102},
  timestamp    = {Mon, 16 Jan 2023 08:52:16 +0100},
  biburl       = {https://dblp.org/rec/conf/cbms/GrisposB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/FlynnGGM20,
  author       = {Talon Flynn and
                  George Grispos and
                  William Bradley Glisson and
                  William Mahoney},
  title        = {Knock! Knock! Who Is There? Investigating Data Leakage from a Medical
                  Internet of Things Hijacking Attack},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/64533},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/FlynnGGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/GlissonGC20,
  author       = {William Bradley Glisson and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Introduction to the Minitrack on Cybersecurity Investigations and
                  Digital Forensics},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--2},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/64523},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/GlissonGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigite/2020,
  editor       = {Deepak Khazanchi and
                  Harvey P. Siy and
                  George Grispos and
                  Tenace Kwaku Setor},
  title        = {{SIGITE} '20: The 21st Annual Conference on Information Technology
                  Education, Virtual Event, USA, October 7-9, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3368308},
  doi          = {10.1145/3368308},
  isbn         = {978-1-4503-7045-5},
  timestamp    = {Thu, 15 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigite/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/GrisposGC19,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Peter Cooper},
  editor       = {Tung Bui},
  title        = {A Bleeding Digital Heart: Identifying Residual Data Generation from
                  Smartphone Applications Interacting with Medical Devices},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://hdl.handle.net/10125/59865},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/GrisposGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/GrisposGS19,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  editor       = {Tung Bui},
  title        = {How Good is Your Data? Investigating the Quality of Data Generated
                  During Security Incident Response Investigations},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://hdl.handle.net/10125/60152},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/GrisposGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigite/BogaardGGGHM19,
  author       = {Daniel S. Bogaard and
                  Hollis J. Greenberg and
                  George Grispos and
                  Bryan S. Goda and
                  Rick Homkes and
                  Kevin McReynolds},
  editor       = {Bryan S. Goda and
                  Steve Zilora and
                  George Grispos and
                  Daniel S. Bogaard},
  title        = {Panel: Online Learning, The Educators Experiences},
  booktitle    = {Proceedings of the 20th Annual {SIG} Conference on Information Technology
                  Education, {SIGITE} 2019, Tacoma, WA, USA, October 3-5, 2019},
  pages        = {99--100},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3349266.3351396},
  doi          = {10.1145/3349266.3351396},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigite/BogaardGGGHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigite/2019,
  editor       = {Bryan S. Goda and
                  Steve Zilora and
                  George Grispos and
                  Daniel S. Bogaard},
  title        = {Proceedings of the 20th Annual {SIG} Conference on Information Technology
                  Education, {SIGITE} 2019, Tacoma, WA, USA, October 3-5, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3349266},
  doi          = {10.1145/3349266},
  isbn         = {978-1-4503-6921-3},
  timestamp    = {Mon, 30 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigite/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-03723,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {How Good is Your Data? Investigating the Quality of Data Generated
                  During Security Incident Response Investigations},
  journal      = {CoRR},
  volume       = {abs/1901.03723},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.03723},
  eprinttype    = {arXiv},
  eprint       = {1901.03723},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-03723.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-03724,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Peter Cooper},
  title        = {A Bleeding Digital Heart: Identifying Residual Data Generation from
                  Smartphone Applications Interacting with Medical Devices},
  journal      = {CoRR},
  volume       = {abs/1901.03724},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.03724},
  eprinttype    = {arXiv},
  eprint       = {1901.03724},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-03724.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PlachkinovaG18,
  author       = {Miloslava Plachkinova and
                  George Grispos},
  editor       = {Tung Bui},
  title        = {Introduction to the Minitrack on Security and Privacy Challenges for
                  Healthcare},
  booktitle    = {51st Hawaii International Conference on System Sciences, {HICSS} 2018,
                  Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018},
  pages        = {1--2},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2018},
  url          = {https://hdl.handle.net/10125/50300},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/PlachkinovaG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LedbetterGMAGC18,
  author       = {William Ledbetter and
                  William Bradley Glisson and
                  Todd McDonald and
                  Todd R. Andel and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Digital Blues: An Investigation Into the Use of Bluetooth Protocols},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {498--503},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00077},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00077},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LedbetterGMAGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-02153,
  author       = {William Ledbetter and
                  William Bradley Glisson and
                  Todd McDonald and
                  Todd R. Andel and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Digital Blues: An Investigation into the Use of Bluetooth Protocols},
  journal      = {CoRR},
  volume       = {abs/1808.02153},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.02153},
  eprinttype    = {arXiv},
  eprint       = {1808.02153},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-02153.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrisposGS17,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Enhancing security incident response follow-up efforts with lightweight
                  agile retrospectives},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {62--73},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.07.006},
  doi          = {10.1016/J.DIIN.2017.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GrisposGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/DevenderGBG17,
  author       = {Maureen Van Devender and
                  William Bradley Glisson and
                  Ryan Benton and
                  George Grispos},
  title        = {Understanding De-identification of Healthcare Big Data},
  booktitle    = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
                  MA, USA, August 10-12, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/amcis2017/Healthcare/Presentations/35},
  timestamp    = {Tue, 23 May 2017 14:16:12 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/DevenderGBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/GrisposGBSM17,
  author       = {George Grispos and
                  William Bradley Glisson and
                  David Bourrie and
                  Tim Storer and
                  Stacy Miller},
  title        = {Security Incident Recognition and Reporting {(SIRR):} An Industrial
                  Perspective},
  booktitle    = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
                  MA, USA, August 10-12, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/GrisposGBSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SainiGLC17,
  author       = {Shalabh Saini and
                  George Grispos and
                  Charles Zhechao Liu and
                  Kim{-}Kwang Raymond Choo},
  title        = {Back to Pen and Paper: Recovering Assessment Questions from Computer-Based
                  Examination Applications},
  booktitle    = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
                  MA, USA, August 10-12, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/amcis2017/ISEducation/Presentations/19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/SainiGLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chase/GrisposGC17,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Paolo Bonato and
                  Honggang Wang},
  title        = {Medical Cyber-Physical Systems Development: {A} Forensics-Driven Approach},
  booktitle    = {Proceedings of the Second {IEEE/ACM} International Conference on Connected
                  Health: Applications, Systems and Engineering Technologies, {CHASE}
                  2017, Philadelphia, PA, USA, July 17-19, 2017},
  pages        = {108--113},
  publisher    = {{IEEE} Computer Society / {ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CHASE.2017.68},
  doi          = {10.1109/CHASE.2017.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chase/GrisposGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PlachkinovaG17,
  author       = {Miloslava Plachkinova and
                  George Grispos},
  editor       = {Tung Bui},
  title        = {Introduction to Security and Privacy Challenges for Healthcare Minitrack},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--2},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41597},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/PlachkinovaG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/GrisposGPN17,
  author       = {George Grispos and
                  Jes{\'{u}}s Garc{\'{\i}}a{-}Gal{\'{a}}n and
                  Liliana Pasquale and
                  Bashar Nuseibeh},
  editor       = {Sa{\"{\i}}d Assar and
                  Oscar Pastor and
                  Haralambos Mouratidis},
  title        = {Are you ready? Towards the engineering of forensic-ready systems},
  booktitle    = {11th International Conference on Research Challenges in Information
                  Science, {RCIS} 2017, Brighton, United Kingdom, May 10-12, 2017},
  pages        = {328--333},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/RCIS.2017.7956555},
  doi          = {10.1109/RCIS.2017.7956555},
  timestamp    = {Mon, 18 Jan 2021 08:56:35 +0100},
  biburl       = {https://dblp.org/rec/conf/rcis/GrisposGPN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/GrisposHN17,
  author       = {George Grispos and
                  Sorren Hanvey and
                  Bashar Nuseibeh},
  editor       = {Dalal Alrajeh and
                  Liliana Pasquale},
  title        = {Use of organisational topologies for forensic investigations},
  booktitle    = {Proceedings of the 1st {ACM} {SIGSOFT} International Workshop on Software
                  Engineering and Digital Forensics, SERF@ESEC/SIGSOFT {FSE} 2017, Paderborn,
                  Germany, September 4, 2017},
  pages        = {2--5},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3121252.3121253},
  doi          = {10.1145/3121252.3121253},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/GrisposHN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrisposGPN17,
  author       = {George Grispos and
                  Jes{\'{u}}s Garc{\'{\i}}a{-}Gal{\'{a}}n and
                  Liliana Pasquale and
                  Bashar Nuseibeh},
  title        = {Are You Ready? Towards the Engineering of Forensic-Ready Systems},
  journal      = {CoRR},
  volume       = {abs/1705.03250},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.03250},
  eprinttype    = {arXiv},
  eprint       = {1705.03250},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrisposGPN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrisposGBSM17,
  author       = {George Grispos and
                  William Bradley Glisson and
                  David Bourrie and
                  Tim Storer and
                  Stacy Miller},
  title        = {Security Incident Recognition and Reporting {(SIRR):} An Industrial
                  Perspective},
  journal      = {CoRR},
  volume       = {abs/1706.06818},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.06818},
  eprinttype    = {arXiv},
  eprint       = {1706.06818},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrisposGBSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-05374,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Kim{-}Kwang Raymond Choo},
  title        = {Medical Cyber-Physical Systems Development: {A} Forensics-Driven Approach},
  journal      = {CoRR},
  volume       = {abs/1708.05374},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.05374},
  eprinttype    = {arXiv},
  eprint       = {1708.05374},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-05374.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Grispos16,
  author       = {George Grispos},
  title        = {On the enhancement of data quality in security incident response investigations},
  school       = {University of Glasgow, {UK}},
  year         = {2016},
  url          = {http://theses.gla.ac.uk/7293/},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Grispos16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GlissonSBGC16,
  author       = {William Bradley Glisson and
                  Tim Storer and
                  Andrew Blyth and
                  George Grispos and
                  Matt Campbell},
  title        = {In-The-Wild Residual Data Research and Privacy},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {1},
  pages        = {7--36},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1371},
  doi          = {10.15394/JDFSL.2016.1371},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GlissonSBGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Garcia-GalanPGN16,
  author       = {Jes{\'{u}}s Garc{\'{\i}}a{-}Gal{\'{a}}n and
                  Liliana Pasquale and
                  George Grispos and
                  Bashar Nuseibeh},
  title        = {Towards adaptive compliance},
  booktitle    = {Proceedings of the 11th International Symposium on Software Engineering
                  for Adaptive and Self-Managing Systems, SEAMS@ICSE 2016, Austin, Texas,
                  USA, May 14-22, 2016},
  pages        = {108--114},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897053.2897070},
  doi          = {10.1145/2897053.2897070},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/Garcia-GalanPGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GlissonSBGC16,
  author       = {William Bradley Glisson and
                  Tim Storer and
                  Andrew Blyth and
                  George Grispos and
                  Matt Campbell},
  title        = {In The Wild Residual Data Research and Privacy},
  journal      = {CoRR},
  volume       = {abs/1610.03229},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.03229},
  eprinttype    = {arXiv},
  eprint       = {1610.03229},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GlissonSBGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Garcia-GalanPGN16,
  author       = {Jes{\'{u}}s Garc{\'{\i}}a{-}Gal{\'{a}}n and
                  Liliana Pasquale and
                  George Grispos and
                  Bashar Nuseibeh},
  title        = {Towards Adaptive Compliance},
  journal      = {CoRR},
  volume       = {abs/1611.05626},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.05626},
  eprinttype    = {arXiv},
  eprint       = {1611.05626},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Garcia-GalanPGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/GrisposGS15,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Security Incident Response Criteria: {A} Practitioner's Perspective},
  booktitle    = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto
                  Rico, August 13-15, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/amcis2015/ISSecurity/GeneralPresentations/35},
  timestamp    = {Sun, 13 Dec 2015 13:10:52 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/GrisposGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/15/GrisposGS15,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  editor       = {Ryan Kok Leong Ko and
                  Kim{-}Kwang Raymond Choo},
  title        = {Recovering residual forensic data from smartphone interactions with
                  cloud storage providers},
  booktitle    = {The Cloud Security Ecosystem - Technical, Legal, Business and Management
                  Issues},
  pages        = {347--382},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/B978-0-12-801595-7.00016-1},
  doi          = {10.1016/B978-0-12-801595-7.00016-1},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/15/GrisposGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrisposGS15,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Recovering Residual Forensic Data from Smartphone Interactions with
                  Cloud Storage Providers},
  journal      = {CoRR},
  volume       = {abs/1506.02268},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.02268},
  eprinttype    = {arXiv},
  eprint       = {1506.02268},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrisposGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrisposGS15a,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Security Incident Response Criteria: {A} Practitioner's Perspective},
  journal      = {CoRR},
  volume       = {abs/1508.02526},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.02526},
  eprinttype    = {arXiv},
  eprint       = {1508.02526},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrisposGS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/GrisposGS14,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Rethinking Security Incident Response: The Integration of Agile Principles},
  booktitle    = {20th Americas Conference on Information Systems, {AMCIS} 2014, Savannah,
                  Georgia, USA, August 7-9, 2014},
  publisher    = {Association for Information Systems},
  year         = {2014},
  url          = {http://aisel.aisnet.org/amcis2014/ISSecurity/GeneralPresentations/9},
  timestamp    = {Wed, 02 Jul 2014 20:04:43 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/GrisposGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrisposGS14,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Rethinking Security Incident Response: The Integration of Agile Principles},
  journal      = {CoRR},
  volume       = {abs/1408.2431},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.2431},
  eprinttype    = {arXiv},
  eprint       = {1408.2431},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrisposGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrisposSG14,
  author       = {George Grispos and
                  Tim Storer and
                  William Bradley Glisson},
  title        = {Calm Before the Storm: The Challenges of Cloud Computing in Digital
                  Forensics},
  journal      = {CoRR},
  volume       = {abs/1410.2123},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.2123},
  eprinttype    = {arXiv},
  eprint       = {1410.2123},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrisposSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrisposGPD14,
  author       = {George Grispos and
                  William Bradley Glisson and
                  John Harold Pardue and
                  Mike Dickson},
  title        = {Identifying User Behavior from Residual Data in Cloud-based Synchronized
                  Apps},
  journal      = {CoRR},
  volume       = {abs/1411.2132},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.2132},
  eprinttype    = {arXiv},
  eprint       = {1411.2132},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrisposGPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/GrisposGS13,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Cloud Security Challenges: Investigating Policies, Standards, And
                  Guidelines In {A} Fortune 500 Organization},
  booktitle    = {21st European Conference on Information Systems, {ECIS} 2013, Utrecht,
                  The Netherlands, June 5-8, 2013},
  pages        = {27},
  year         = {2013},
  url          = {http://aisel.aisnet.org/ecis2013\_cr/27},
  timestamp    = {Mon, 05 Dec 2016 15:14:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/GrisposGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/GrisposGS13,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud
                  Storage Services},
  booktitle    = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
                  Wailea, HI, USA, January 7-10, 2013},
  pages        = {4910--4919},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HICSS.2013.592},
  doi          = {10.1109/HICSS.2013.592},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/GrisposGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-4078,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Using Smartphones as a Proxy for Forensic Evidence contained in Cloud
                  Storage Services},
  journal      = {CoRR},
  volume       = {abs/1303.4078},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.4078},
  eprinttype    = {arXiv},
  eprint       = {1303.4078},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-4078.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GrisposGS13,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Cloud Security Challenges: Investigating Policies, Standards, and
                  Guidelines in a Fortune 500 Organization},
  journal      = {CoRR},
  volume       = {abs/1306.2477},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.2477},
  eprinttype    = {arXiv},
  eprint       = {1306.2477},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GrisposGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GrisposSG12,
  author       = {George Grispos and
                  Tim Storer and
                  William Bradley Glisson},
  title        = {Calm Before the Storm: The Challenges of Cloud Computing in Digital
                  Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {28--48},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040103},
  doi          = {10.4018/JDCF.2012040103},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GrisposSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrisposSG11,
  author       = {George Grispos and
                  Tim Storer and
                  William Bradley Glisson},
  title        = {A comparison of forensic evidence recovery techniques for a windows
                  mobile smart phone},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {23--36},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.016},
  doi          = {10.1016/J.DIIN.2011.05.016},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GrisposSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GlissonSMMG11,
  author       = {William Bradley Glisson and
                  Tim Storer and
                  Gavin Mayall and
                  Iain Moug and
                  George Grispos},
  title        = {Electronic retention: what does your mobile phone reveal about you?},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {6},
  pages        = {337--349},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0144-3},
  doi          = {10.1007/S10207-011-0144-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GlissonSMMG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}