default search action
Tim Storer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c31]Lixin Su, Tim Storer:
A Case Study of DevOps Adoption within a Large Financial Organisation. ICSME 2023: 403-413 - 2022
- [c30]Mohammed Alhamed, Tim Storer:
Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues. ICSME 2022: 129-138 - 2021
- [j12]Nystrom Edwards, Dhitiwat Jongsuebchoke, Tim Storer:
Sciit: Embedding issue tracking in source control management. Sci. Comput. Program. 206: 102628 (2021) - [c29]Mohammed Alhamed, Tim Storer:
Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates. ICSE 2021: 1-12 - [i12]William Wallis, William Kavanagh, Alice Miller, Tim Storer:
Designing a mobile game to generate player data - lessons learned. CoRR abs/2101.07144 (2021) - 2020
- [j11]Gibrail Islam, Tim Storer:
A case study of agile software development for safety-Critical systems projects. Reliab. Eng. Syst. Saf. 200: 106954 (2020)
2010 – 2019
- 2019
- [c28]Abdulwhab Alkharashi, Tim Storer, Joemon M. Jose, Andrew Hoskins, Catherine Happer:
Understanding Abusive Behaviour Between Online and Offline Group Discussions. CHI Extended Abstracts 2019 - [c27]Saad Altamimi, Karen Renaud, Timothy Storer:
"I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical Interns. CRiSIS 2019: 227-243 - [c26]George Grispos, William Bradley Glisson, Tim Storer:
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations. HICSS 2019: 1-10 - [c25]Mohammed Alhamed, Tim Storer:
Estimating Software Task Effort in Crowds. ICSME 2019: 281-285 - [c24]Nystrom Edwards, Dhitiwat Jongsuebchoke, Tim Storer:
Sciit: Aligning Source Control Management and Issue Tracking Architectures. ICSME 2019: 402-405 - [c23]Tim Storer, Ruxandra Bob:
Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites. SCAM 2019: 228-237 - [i11]George Grispos, William Bradley Glisson, Tim Storer:
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations. CoRR abs/1901.03723 (2019) - 2018
- [j10]Robbie Simpson, Tim Storer:
Third-party verifiable voting systems: Addressing motivation and incentives in e-voting. J. Inf. Secur. Appl. 38: 132-138 (2018) - [c22]Tom Wallis, Tim Storer:
Modelling Realistic User Behaviour in Information Systems Simulations as Fuzzing Aspects. CAiSE Forum 2018: 254-268 - [c21]Rawan Baalous, Ronald Poet, Timothy Storer:
Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices. IC2E 2018: 218-224 - [c20]Tom Wallis, Tim Storer:
Process Fuzzing as an Approach to Genetic Programming. SICSA ReaLX 2018 - 2017
- [j9]Tim Storer:
Bridging the Chasm: A Survey of Software Engineering Practice in Scientific Programming. ACM Comput. Surv. 50(4): 47:1-47:32 (2017) - [j8]George Grispos, William Bradley Glisson, Tim Storer:
Enhancing security incident response follow-up efforts with lightweight agile retrospectives. Digit. Investig. 22: 62-73 (2017) - [c19]Dhahi Alshammari, Jeremy Singer, Timothy Storer:
Does CloudSim Accurately Model Micro Datacenters? CLOUD 2017: 705-709 - [c18]George Grispos, William Bradley Glisson, David Bourrie, Tim Storer, Stacy Miller:
Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. AMCIS 2017 - [c17]Robbie Simpson, Tim Storer:
Experimenting with Realism in Software Engineering Team Projects: An Experience Report. CSEE&T 2017: 87-96 - [i10]George Grispos, William Bradley Glisson, David Bourrie, Tim Storer, Stacy Miller:
Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. CoRR abs/1706.06818 (2017) - 2016
- [j7]William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell:
In-The-Wild Residual Data Research and Privacy. J. Digit. Forensics Secur. Law 11(1): 7-36 (2016) - [i9]William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell:
In The Wild Residual Data Research and Privacy. CoRR abs/1610.03229 (2016) - 2015
- [c16]George Grispos, William Bradley Glisson, Tim Storer:
Security Incident Response Criteria: A Practitioner's Perspective. AMCIS 2015 - [c15]Robbie Simpson, Tim Storer:
Formalising Responsibility Modelling for Automatic Analysis. EOMAS@CAiSE 2015: 125-140 - [p1]George Grispos, William Bradley Glisson, Tim Storer:
Recovering residual forensic data from smartphone interactions with cloud storage providers. The Cloud Security Ecosystem 2015: 347-382 - [i8]George Grispos, William Bradley Glisson, Tim Storer:
Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers. CoRR abs/1506.02268 (2015) - [i7]George Grispos, William Bradley Glisson, Tim Storer:
Security Incident Response Criteria: A Practitioner's Perspective. CoRR abs/1508.02526 (2015) - 2014
- [c14]George Grispos, William Bradley Glisson, Tim Storer:
Rethinking Security Incident Response: The Integration of Agile Principles. AMCIS 2014 - [i6]George Grispos, William Bradley Glisson, Tim Storer:
Rethinking Security Incident Response: The Integration of Agile Principles. CoRR abs/1408.2431 (2014) - [i5]George Grispos, Tim Storer, William Bradley Glisson:
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. CoRR abs/1410.2123 (2014) - 2013
- [j6]Heather Crawford, Karen Renaud, Tim Storer:
A framework for continuous, transparent mobile device authentication. Comput. Secur. 39: 127-136 (2013) - [j5]William Bradley Glisson, Tim Storer, Joe Buchanan-Wollaston:
An empirical comparison of data recovered from mobile forensic toolkits. Digit. Investig. 10(1): 44-55 (2013) - [c13]William Bradley Glisson, Tim Storer:
Investigating Information Security Risks of Mobile Device Use within Organizations. AMCIS 2013 - [c12]George Grispos, William Bradley Glisson, Tim Storer:
Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization. ECIS 2013: 27 - [c11]George Grispos, William Bradley Glisson, Tim Storer:
Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services. HICSS 2013: 4910-4919 - [c10]Joe Buchanan-Wollaston, Tim Storer, William Bradley Glisson:
Comparison of the Data Recovery Function of Forensic Tools. IFIP Int. Conf. Digital Forensics 2013: 331-347 - [c9]Tim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib, Pamela Briggs, Karen Renaud, Mehmet Vefa Bicakci:
Encouraging second thoughts: Obstructive user interfaces for raising security awareness. PST 2013: 366-368 - [i4]George Grispos, William Bradley Glisson, Tim Storer:
Using Smartphones as a Proxy for Forensic Evidence contained in Cloud Storage Services. CoRR abs/1303.4078 (2013) - [i3]George Grispos, William Bradley Glisson, Tim Storer:
Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization. CoRR abs/1306.2477 (2013) - [i2]William Bradley Glisson, Tim Storer:
Investigating Information Security Risks of Mobile Device Use within Organizations. CoRR abs/1309.0521 (2013) - 2012
- [j4]George Grispos, Tim Storer, William Bradley Glisson:
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. Int. J. Digit. Crime Forensics 4(2): 28-48 (2012) - [c8]Ian Sommerville, Russell Lock, Tim Storer:
Information Requirements for Enterprise Systems. Monterey Workshop 2012: 266-282 - [i1]Ian Sommerville, Russell Lock, Tim Storer:
Information requirements for enterprise systems. CoRR abs/1209.5246 (2012) - 2011
- [j3]George Grispos, Tim Storer, William Bradley Glisson:
A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digit. Investig. 8(1): 23-36 (2011) - [j2]Khawla Al-Wehaibi, Tim Storer, William Bradley Glisson:
Augmenting password recovery with online profiling. Digit. Investig. 8(Supplement): S25-S33 (2011) - [j1]William Bradley Glisson, Tim Storer, Gavin Mayall, Iain Moug, George Grispos:
Electronic retention: what does your mobile phone reveal about you? Int. J. Inf. Sec. 10(6): 337-349 (2011) - [c7]Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva:
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security. STM 2011: 28-39
2000 – 2009
- 2009
- [c6]Tim Storer, Russell Lock:
Accuracy: The Fundamental Requirement for Voting Systems. ARES 2009: 374-379 - [c5]Ian Sommerville, Russell Lock, Tim Storer, John Dobson:
Deriving Information Requirements from Responsibility Models. CAiSE 2009: 515-529 - 2007
- [c4]Colin Allison, Tim Storer, Stuart D. J. Purdie, Rosa Michaelson:
An Evaluation Framework for Grid-based Learning Technologies. ICALT 2007: 200-204 - 2005
- [c3]Tim Storer, Ishbel Duncan:
Two Variations to the mCESG Pollsterless E-Voting Scheme. COMPSAC (1) 2005: 425-430 - [c2]Tim Storer, Ishbel Duncan:
Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies. PST 2005 - 2004
- [c1]Tim Storer, Ishbel Duncan:
Practical Remote Electronic Elections for the UK. PST 2004: 41-45
Coauthor Index
aka: William Bradley Glisson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint