


default search action
BibTeX records: George Grispos
@article{DBLP:journals/access/MearsDG25, author = {Logan Mears and Rachel Donner and George Grispos}, title = {Old MacDonald and His Hackable Smartphone Application: {A} Security and Privacy Analysis of Android Agriculture Applications}, journal = {{IEEE} Access}, volume = {13}, pages = {114216--114229}, year = {2025}, url = {https://doi.org/10.1109/ACCESS.2025.3584673}, doi = {10.1109/ACCESS.2025.3584673}, timestamp = {Sat, 09 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MearsDG25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/FarjadPKGG25, author = {Sheikh Muhammad Farjad and Sandeep Reddy Patllola and Yonas Kassa and George Grispos and Robin Gandhi}, title = {Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking}, booktitle = {Proceedings of the 2025 {ACM} Southeast Conference, {ACMSE} 2025, Southeast Missouri State University, Cape Girardeau, MO, USA, April 24-26, 2025}, pages = {145--154}, publisher = {{ACM}}, year = {2025}, url = {https://doi.org/10.1145/3696673.3723074}, doi = {10.1145/3696673.3723074}, timestamp = {Wed, 11 Jun 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMse/FarjadPKGG25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2503-16283, author = {Mark Freyhof and George Grispos and Santosh K. Pitla and William Mahoney}, title = {Investigating The Implications of Cyberattacks Against Precision Agricultural Equipment}, journal = {CoRR}, volume = {abs/2503.16283}, year = {2025}, url = {https://doi.org/10.48550/arXiv.2503.16283}, doi = {10.48550/ARXIV.2503.16283}, eprinttype = {arXiv}, eprint = {2503.16283}, timestamp = {Mon, 14 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2503-16283.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2503-16292, author = {George Grispos and Logan Mears and Larry Loucks and William Mahoney}, title = {Cultivating Cybersecurity: Designing a Cybersecurity Curriculum for the Food and Agriculture Sector}, journal = {CoRR}, volume = {abs/2503.16292}, year = {2025}, url = {https://doi.org/10.48550/arXiv.2503.16292}, doi = {10.48550/ARXIV.2503.16292}, eprinttype = {arXiv}, eprint = {2503.16292}, timestamp = {Mon, 14 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2503-16292.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2503-18857, author = {Sheikh Muhammad Farjad and Sandeep Reddy Patllola and Yonas Kassa and George Grispos and Robin Gandhi}, title = {Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking}, journal = {CoRR}, volume = {abs/2503.18857}, year = {2025}, url = {https://doi.org/10.48550/arXiv.2503.18857}, doi = {10.48550/ARXIV.2503.18857}, eprinttype = {arXiv}, eprint = {2503.18857}, timestamp = {Sat, 19 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2503-18857.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2505-23800, author = {George Grispos and Logan Mears and Larry Loucks}, title = {Strengthening Cybersecurity Resilience in Agriculture Through Educational Interventions: {A} Case Study of the Ponca Tribe of Nebraska}, journal = {CoRR}, volume = {abs/2505.23800}, year = {2025}, url = {https://doi.org/10.48550/arXiv.2505.23800}, doi = {10.48550/ARXIV.2505.23800}, eprinttype = {arXiv}, eprint = {2505.23800}, timestamp = {Sun, 29 Jun 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2505-23800.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrisposSA24, author = {George Grispos and Hudan Studiawan and Saed Alrabaee}, title = {Internet of things (IoT) forensics and incident response: The good, the bad, and the unaddressed}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301671}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301671}, doi = {10.1016/J.FSIDI.2023.301671}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrisposSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StudiawanGC23, author = {Hudan Studiawan and George Grispos and Kim{-}Kwang Raymond Choo}, title = {Unmanned Aerial Vehicle {(UAV)} Forensics: The Good, The Bad, and the Unaddressed}, journal = {Comput. Secur.}, volume = {132}, pages = {103340}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103340}, doi = {10.1016/J.COSE.2023.103340}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StudiawanGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/GrisposCG23, author = {George Grispos and Kim{-}Kwang Raymond Choo and William Bradley Glisson}, title = {Sickly Apps: {A} Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices}, journal = {Mob. Networks Appl.}, volume = {28}, number = {4}, pages = {1282--1292}, year = {2023}, url = {https://doi.org/10.1007/s11036-022-02049-8}, doi = {10.1007/S11036-022-02049-8}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/GrisposCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/GlissonGM23, author = {William Glisson and George Grispos and Jeffrey Todd McDonald}, editor = {Tung X. Bui}, title = {Introduction to the Minitrack on Cyber Operations, Defense, and Forensics}, booktitle = {56th Hawaii International Conference on System Sciences, {HICSS} 2023, Maui, Hawaii, USA, January 3-6, 2023}, pages = {6601--6602}, publisher = {ScholarSpace}, year = {2023}, url = {https://hdl.handle.net/10125/103432}, timestamp = {Thu, 16 Feb 2023 16:52:47 +0100}, biburl = {https://dblp.org/rec/conf/hicss/GlissonGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/NashSGC23, author = {Aleck Nash and Hudan Studiawan and George Grispos and Kim{-}Kwang Raymond Choo}, editor = {Sanjay Goel and Paulo Roberto Nunes de Souza}, title = {Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy}, booktitle = {Digital Forensics and Cyber Crime - 14th {EAI} International Conference, {ICDF2C} 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {571}, pages = {197--206}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56583-0\_13}, doi = {10.1007/978-3-031-56583-0\_13}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdf2c/NashSGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/GlissonGM22, author = {William Glisson and George Grispos and Jeffrey Todd McDonald}, title = {Introduction to the Minitrack on Cyber Operations, Defence, and Forensics}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--2}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/80246}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/GlissonGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-05866, author = {Mark Freyhof and George Grispos and Santosh K. Pitla and Cody Stolle}, title = {Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments}, journal = {CoRR}, volume = {abs/2205.05866}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.05866}, doi = {10.48550/ARXIV.2205.05866}, eprinttype = {arXiv}, eprint = {2205.05866}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-05866.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-03607, author = {George Grispos and William R. Mahoney}, title = {Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry}, journal = {CoRR}, volume = {abs/2208.03607}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.03607}, doi = {10.48550/ARXIV.2208.03607}, eprinttype = {arXiv}, eprint = {2208.03607}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-03607.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-DhaqmIKRGCAA21, author = {Arafat Al{-}Dhaqm and Richard Adeyemi Ikuesan and Victor R. Kebande and Shukor Abd Razak and George Grispos and Kim{-}Kwang Raymond Choo and Bander Ali Saleh Al{-}Rimy and Abdul Rahman A. Alsewari}, title = {Digital Forensics Subdomains: The State of the Art and Future Directions}, journal = {{IEEE} Access}, volume = {9}, pages = {152476--152502}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3124262}, doi = {10.1109/ACCESS.2021.3124262}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/Al-DhaqmIKRGCAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/ShettyGC21, author = {Rushank Shetty and George Grispos and Kim{-}Kwang Raymond Choo}, title = {Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {6}, number = {2}, pages = {197--207}, year = {2021}, url = {https://doi.org/10.1109/TSUSC.2017.2783858}, doi = {10.1109/TSUSC.2017.2783858}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/ShettyGC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fabulous/GrisposFGC21, author = {George Grispos and Talon Flynn and William Bradley Glisson and Kim{-}Kwang Raymond Choo}, editor = {Dragan Perakovic and Lucia Knapc{\'{\i}}kov{\'{a}}}, title = {Investigating Protected Health Information Leakage from Android Medical Applications}, booktitle = {Future Access Enablers for Ubiquitous and Intelligent Infrastructures - 5th {EAI} International Conference, {FABULOUS} 2021, Virtual Event, May 6-7, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {382}, pages = {311--322}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78459-1\_23}, doi = {10.1007/978-3-030-78459-1\_23}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fabulous/GrisposFGC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ChooGG21, author = {Kim{-}Kwang Raymond Choo and George Grispos and William Bradley Glisson}, title = {Introduction to the Minitrack on Cyber Operations, Defence, and Forensics}, booktitle = {54th Hawaii International Conference on System Sciences, {HICSS} 2021, Kauai, Hawaii, USA, January 5, 2021}, pages = {1--2}, publisher = {ScholarSpace}, year = {2021}, url = {https://hdl.handle.net/10125/71454}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/ChooGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DelgadoGSMGB21, author = {Alberto Alejandro Ceballos Delgado and William Bradley Glisson and Narasimha K. Shashidhar and Jeffrey Todd McDonald and George Grispos and Ryan Benton}, title = {Deception Detection Using Machine Learning}, booktitle = {54th Hawaii International Conference on System Sciences, {HICSS} 2021, Kauai, Hawaii, USA, January 5, 2021}, pages = {1--10}, publisher = {ScholarSpace}, year = {2021}, url = {https://hdl.handle.net/10125/71478}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/DelgadoGSMGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/JacomeSFG21, author = {Ricardo O. Jacome and Cody Stolle and Ronald K. Faller and George Grispos}, editor = {Toufik Ahmed and Olivier Festor and Yacine Ghamri{-}Doudane and Joon{-}Myung Kang and Alberto E. Schaeffer Filho and Abdelkader Lahmadi and Edmundo R. M. Madeira}, title = {A Dynamically-Concise Roadmap Framework for Guiding Connected and Automated Vehicles}, booktitle = {17th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2021, Bordeaux, France, May 17-21, 2021}, pages = {1009--1017}, publisher = {{IEEE}}, year = {2021}, url = {https://ieeexplore.ieee.org/document/9464060}, timestamp = {Mon, 05 Jul 2021 08:04:03 +0200}, biburl = {https://dblp.org/rec/conf/im/JacomeSFG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GrisposTCMG21, author = {George Grispos and Frank Tursi and Kim{-}Kwang Raymond Choo and William Mahoney and William Bradley Glisson}, title = {A Digital Forensics Investigation of a Smart Scale IoT Ecosystem}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {710--717}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00104}, doi = {10.1109/TRUSTCOM53373.2021.00104}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GrisposTCMG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-07360, author = {George Grispos and Talon Flynn and William Bradley Glisson and Kim{-}Kwang Raymond Choo}, title = {Investigating Protected Health Information Leakage from Android Medical Applications}, journal = {CoRR}, volume = {abs/2105.07360}, year = {2021}, url = {https://arxiv.org/abs/2105.07360}, eprinttype = {arXiv}, eprint = {2105.07360}, timestamp = {Tue, 18 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-07360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-05518, author = {George Grispos and Frank Tursi and Kim{-}Kwang Raymond Choo and William Mahoney and William Bradley Glisson}, title = {A Digital Forensics Investigation of a Smart Scale IoT Ecosystem}, journal = {CoRR}, volume = {abs/2109.05518}, year = {2021}, url = {https://arxiv.org/abs/2109.05518}, eprinttype = {arXiv}, eprint = {2109.05518}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-05518.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbms/GrisposB20, author = {George Grispos and Kiran Bastola}, editor = {Alba Garc{\'{\i}}a Seco de Herrera and Alejandro Rodr{\'{\i}}guez Gonz{\'{a}}lez and KC Santosh and Zelalem Temesgen and Bridget Kane and Paolo Soda}, title = {Cyber Autopsies: The Integration of Digital Forensics into Medical Contexts}, booktitle = {33rd {IEEE} International Symposium on Computer-Based Medical Systems, {CBMS} 2020, Rochester, MN, USA, July 28-30, 2020}, pages = {510--513}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CBMS49503.2020.00102}, doi = {10.1109/CBMS49503.2020.00102}, timestamp = {Mon, 16 Jan 2023 08:52:16 +0100}, biburl = {https://dblp.org/rec/conf/cbms/GrisposB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/FlynnGGM20, author = {Talon Flynn and George Grispos and William Bradley Glisson and William Mahoney}, title = {Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--10}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/64533}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/FlynnGGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/GlissonGC20, author = {William Bradley Glisson and George Grispos and Kim{-}Kwang Raymond Choo}, title = {Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--2}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/64523}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/GlissonGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sigite/2020, editor = {Deepak Khazanchi and Harvey P. Siy and George Grispos and Tenace Kwaku Setor}, title = {{SIGITE} '20: The 21st Annual Conference on Information Technology Education, Virtual Event, USA, October 7-9, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3368308}, doi = {10.1145/3368308}, isbn = {978-1-4503-7045-5}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigite/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/GrisposGC19, author = {George Grispos and William Bradley Glisson and Peter Cooper}, editor = {Tung Bui}, title = {A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/59865}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/GrisposGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/GrisposGS19, author = {George Grispos and William Bradley Glisson and Tim Storer}, editor = {Tung Bui}, title = {How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/60152}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/GrisposGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigite/BogaardGGGHM19, author = {Daniel S. Bogaard and Hollis J. Greenberg and George Grispos and Bryan S. Goda and Rick Homkes and Kevin McReynolds}, editor = {Bryan S. Goda and Steve Zilora and George Grispos and Daniel S. Bogaard}, title = {Panel: Online Learning, The Educators Experiences}, booktitle = {Proceedings of the 20th Annual {SIG} Conference on Information Technology Education, {SIGITE} 2019, Tacoma, WA, USA, October 3-5, 2019}, pages = {99--100}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3349266.3351396}, doi = {10.1145/3349266.3351396}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigite/BogaardGGGHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sigite/2019, editor = {Bryan S. Goda and Steve Zilora and George Grispos and Daniel S. Bogaard}, title = {Proceedings of the 20th Annual {SIG} Conference on Information Technology Education, {SIGITE} 2019, Tacoma, WA, USA, October 3-5, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3349266}, doi = {10.1145/3349266}, isbn = {978-1-4503-6921-3}, timestamp = {Mon, 30 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigite/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-03723, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations}, journal = {CoRR}, volume = {abs/1901.03723}, year = {2019}, url = {http://arxiv.org/abs/1901.03723}, eprinttype = {arXiv}, eprint = {1901.03723}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-03723.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-03724, author = {George Grispos and William Bradley Glisson and Peter Cooper}, title = {A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices}, journal = {CoRR}, volume = {abs/1901.03724}, year = {2019}, url = {http://arxiv.org/abs/1901.03724}, eprinttype = {arXiv}, eprint = {1901.03724}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-03724.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PlachkinovaG18, author = {Miloslava Plachkinova and George Grispos}, editor = {Tung Bui}, title = {Introduction to the Minitrack on Security and Privacy Challenges for Healthcare}, booktitle = {51st Hawaii International Conference on System Sciences, {HICSS} 2018, Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018}, pages = {1--2}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2018}, url = {https://hdl.handle.net/10125/50300}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/PlachkinovaG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LedbetterGMAGC18, author = {William Ledbetter and William Bradley Glisson and Todd McDonald and Todd R. Andel and George Grispos and Kim{-}Kwang Raymond Choo}, title = {Digital Blues: An Investigation Into the Use of Bluetooth Protocols}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {498--503}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00077}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00077}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LedbetterGMAGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-02153, author = {William Ledbetter and William Bradley Glisson and Todd McDonald and Todd R. Andel and George Grispos and Kim{-}Kwang Raymond Choo}, title = {Digital Blues: An Investigation into the Use of Bluetooth Protocols}, journal = {CoRR}, volume = {abs/1808.02153}, year = {2018}, url = {http://arxiv.org/abs/1808.02153}, eprinttype = {arXiv}, eprint = {1808.02153}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-02153.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrisposGS17, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Enhancing security incident response follow-up efforts with lightweight agile retrospectives}, journal = {Digit. Investig.}, volume = {22}, pages = {62--73}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.07.006}, doi = {10.1016/J.DIIN.2017.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrisposGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/DevenderGBG17, author = {Maureen Van Devender and William Bradley Glisson and Ryan Benton and George Grispos}, title = {Understanding De-identification of Healthcare Big Data}, booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston, MA, USA, August 10-12, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/amcis2017/Healthcare/Presentations/35}, timestamp = {Tue, 23 May 2017 14:16:12 +0200}, biburl = {https://dblp.org/rec/conf/amcis/DevenderGBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/GrisposGBSM17, author = {George Grispos and William Bradley Glisson and David Bourrie and Tim Storer and Stacy Miller}, title = {Security Incident Recognition and Reporting {(SIRR):} An Industrial Perspective}, booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston, MA, USA, August 10-12, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/GrisposGBSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SainiGLC17, author = {Shalabh Saini and George Grispos and Charles Zhechao Liu and Kim{-}Kwang Raymond Choo}, title = {Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications}, booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston, MA, USA, August 10-12, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/amcis2017/ISEducation/Presentations/19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/SainiGLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chase/GrisposGC17, author = {George Grispos and William Bradley Glisson and Kim{-}Kwang Raymond Choo}, editor = {Paolo Bonato and Honggang Wang}, title = {Medical Cyber-Physical Systems Development: {A} Forensics-Driven Approach}, booktitle = {Proceedings of the Second {IEEE/ACM} International Conference on Connected Health: Applications, Systems and Engineering Technologies, {CHASE} 2017, Philadelphia, PA, USA, July 17-19, 2017}, pages = {108--113}, publisher = {{IEEE} Computer Society / {ACM}}, year = {2017}, url = {https://doi.org/10.1109/CHASE.2017.68}, doi = {10.1109/CHASE.2017.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chase/GrisposGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PlachkinovaG17, author = {Miloslava Plachkinova and George Grispos}, editor = {Tung Bui}, title = {Introduction to Security and Privacy Challenges for Healthcare Minitrack}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--2}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41597}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/PlachkinovaG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/GrisposGPN17, author = {George Grispos and Jes{\'{u}}s Garc{\'{\i}}a{-}Gal{\'{a}}n and Liliana Pasquale and Bashar Nuseibeh}, editor = {Sa{\"{\i}}d Assar and Oscar Pastor and Haralambos Mouratidis}, title = {Are you ready? Towards the engineering of forensic-ready systems}, booktitle = {11th International Conference on Research Challenges in Information Science, {RCIS} 2017, Brighton, United Kingdom, May 10-12, 2017}, pages = {328--333}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/RCIS.2017.7956555}, doi = {10.1109/RCIS.2017.7956555}, timestamp = {Mon, 18 Jan 2021 08:56:35 +0100}, biburl = {https://dblp.org/rec/conf/rcis/GrisposGPN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/GrisposHN17, author = {George Grispos and Sorren Hanvey and Bashar Nuseibeh}, editor = {Dalal Alrajeh and Liliana Pasquale}, title = {Use of organisational topologies for forensic investigations}, booktitle = {Proceedings of the 1st {ACM} {SIGSOFT} International Workshop on Software Engineering and Digital Forensics, SERF@ESEC/SIGSOFT {FSE} 2017, Paderborn, Germany, September 4, 2017}, pages = {2--5}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3121252.3121253}, doi = {10.1145/3121252.3121253}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/GrisposHN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrisposGPN17, author = {George Grispos and Jes{\'{u}}s Garc{\'{\i}}a{-}Gal{\'{a}}n and Liliana Pasquale and Bashar Nuseibeh}, title = {Are You Ready? Towards the Engineering of Forensic-Ready Systems}, journal = {CoRR}, volume = {abs/1705.03250}, year = {2017}, url = {http://arxiv.org/abs/1705.03250}, eprinttype = {arXiv}, eprint = {1705.03250}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrisposGPN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrisposGBSM17, author = {George Grispos and William Bradley Glisson and David Bourrie and Tim Storer and Stacy Miller}, title = {Security Incident Recognition and Reporting {(SIRR):} An Industrial Perspective}, journal = {CoRR}, volume = {abs/1706.06818}, year = {2017}, url = {http://arxiv.org/abs/1706.06818}, eprinttype = {arXiv}, eprint = {1706.06818}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrisposGBSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-05374, author = {George Grispos and William Bradley Glisson and Kim{-}Kwang Raymond Choo}, title = {Medical Cyber-Physical Systems Development: {A} Forensics-Driven Approach}, journal = {CoRR}, volume = {abs/1708.05374}, year = {2017}, url = {http://arxiv.org/abs/1708.05374}, eprinttype = {arXiv}, eprint = {1708.05374}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-05374.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Grispos16, author = {George Grispos}, title = {On the enhancement of data quality in security incident response investigations}, school = {University of Glasgow, {UK}}, year = {2016}, url = {http://theses.gla.ac.uk/7293/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Grispos16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GlissonSBGC16, author = {William Bradley Glisson and Tim Storer and Andrew Blyth and George Grispos and Matt Campbell}, title = {In-The-Wild Residual Data Research and Privacy}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {1}, pages = {7--36}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1371}, doi = {10.15394/JDFSL.2016.1371}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GlissonSBGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Garcia-GalanPGN16, author = {Jes{\'{u}}s Garc{\'{\i}}a{-}Gal{\'{a}}n and Liliana Pasquale and George Grispos and Bashar Nuseibeh}, title = {Towards adaptive compliance}, booktitle = {Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS@ICSE 2016, Austin, Texas, USA, May 14-22, 2016}, pages = {108--114}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897053.2897070}, doi = {10.1145/2897053.2897070}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icse/Garcia-GalanPGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GlissonSBGC16, author = {William Bradley Glisson and Tim Storer and Andrew Blyth and George Grispos and Matt Campbell}, title = {In The Wild Residual Data Research and Privacy}, journal = {CoRR}, volume = {abs/1610.03229}, year = {2016}, url = {http://arxiv.org/abs/1610.03229}, eprinttype = {arXiv}, eprint = {1610.03229}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GlissonSBGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Garcia-GalanPGN16, author = {Jes{\'{u}}s Garc{\'{\i}}a{-}Gal{\'{a}}n and Liliana Pasquale and George Grispos and Bashar Nuseibeh}, title = {Towards Adaptive Compliance}, journal = {CoRR}, volume = {abs/1611.05626}, year = {2016}, url = {http://arxiv.org/abs/1611.05626}, eprinttype = {arXiv}, eprint = {1611.05626}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Garcia-GalanPGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/GrisposGS15, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Security Incident Response Criteria: {A} Practitioner's Perspective}, booktitle = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto Rico, August 13-15, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/amcis2015/ISSecurity/GeneralPresentations/35}, timestamp = {Sun, 13 Dec 2015 13:10:52 +0100}, biburl = {https://dblp.org/rec/conf/amcis/GrisposGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/el/15/GrisposGS15, author = {George Grispos and William Bradley Glisson and Tim Storer}, editor = {Ryan Kok Leong Ko and Kim{-}Kwang Raymond Choo}, title = {Recovering residual forensic data from smartphone interactions with cloud storage providers}, booktitle = {The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues}, pages = {347--382}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/B978-0-12-801595-7.00016-1}, doi = {10.1016/B978-0-12-801595-7.00016-1}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/el/15/GrisposGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrisposGS15, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers}, journal = {CoRR}, volume = {abs/1506.02268}, year = {2015}, url = {http://arxiv.org/abs/1506.02268}, eprinttype = {arXiv}, eprint = {1506.02268}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrisposGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrisposGS15a, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Security Incident Response Criteria: {A} Practitioner's Perspective}, journal = {CoRR}, volume = {abs/1508.02526}, year = {2015}, url = {http://arxiv.org/abs/1508.02526}, eprinttype = {arXiv}, eprint = {1508.02526}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrisposGS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/GrisposGS14, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Rethinking Security Incident Response: The Integration of Agile Principles}, booktitle = {20th Americas Conference on Information Systems, {AMCIS} 2014, Savannah, Georgia, USA, August 7-9, 2014}, publisher = {Association for Information Systems}, year = {2014}, url = {http://aisel.aisnet.org/amcis2014/ISSecurity/GeneralPresentations/9}, timestamp = {Wed, 02 Jul 2014 20:04:43 +0200}, biburl = {https://dblp.org/rec/conf/amcis/GrisposGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrisposGS14, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Rethinking Security Incident Response: The Integration of Agile Principles}, journal = {CoRR}, volume = {abs/1408.2431}, year = {2014}, url = {http://arxiv.org/abs/1408.2431}, eprinttype = {arXiv}, eprint = {1408.2431}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrisposGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrisposSG14, author = {George Grispos and Tim Storer and William Bradley Glisson}, title = {Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics}, journal = {CoRR}, volume = {abs/1410.2123}, year = {2014}, url = {http://arxiv.org/abs/1410.2123}, eprinttype = {arXiv}, eprint = {1410.2123}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrisposSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrisposGPD14, author = {George Grispos and William Bradley Glisson and John Harold Pardue and Mike Dickson}, title = {Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps}, journal = {CoRR}, volume = {abs/1411.2132}, year = {2014}, url = {http://arxiv.org/abs/1411.2132}, eprinttype = {arXiv}, eprint = {1411.2132}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrisposGPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/GrisposGS13, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In {A} Fortune 500 Organization}, booktitle = {21st European Conference on Information Systems, {ECIS} 2013, Utrecht, The Netherlands, June 5-8, 2013}, pages = {27}, year = {2013}, url = {http://aisel.aisnet.org/ecis2013\_cr/27}, timestamp = {Mon, 05 Dec 2016 15:14:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/GrisposGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/GrisposGS13, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services}, booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013, Wailea, HI, USA, January 7-10, 2013}, pages = {4910--4919}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/HICSS.2013.592}, doi = {10.1109/HICSS.2013.592}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/GrisposGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-4078, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Using Smartphones as a Proxy for Forensic Evidence contained in Cloud Storage Services}, journal = {CoRR}, volume = {abs/1303.4078}, year = {2013}, url = {http://arxiv.org/abs/1303.4078}, eprinttype = {arXiv}, eprint = {1303.4078}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-4078.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GrisposGS13, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization}, journal = {CoRR}, volume = {abs/1306.2477}, year = {2013}, url = {http://arxiv.org/abs/1306.2477}, eprinttype = {arXiv}, eprint = {1306.2477}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GrisposGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GrisposSG12, author = {George Grispos and Tim Storer and William Bradley Glisson}, title = {Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {28--48}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040103}, doi = {10.4018/JDCF.2012040103}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/GrisposSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrisposSG11, author = {George Grispos and Tim Storer and William Bradley Glisson}, title = {A comparison of forensic evidence recovery techniques for a windows mobile smart phone}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {23--36}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.016}, doi = {10.1016/J.DIIN.2011.05.016}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GrisposSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GlissonSMMG11, author = {William Bradley Glisson and Tim Storer and Gavin Mayall and Iain Moug and George Grispos}, title = {Electronic retention: what does your mobile phone reveal about you?}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {6}, pages = {337--349}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0144-3}, doi = {10.1007/S10207-011-0144-3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GlissonSMMG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.