default search action
George Grispos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]George Grispos, Hudan Studiawan, Saed Alrabaee:
Internet of things (IoT) forensics and incident response: The good, the bad, and the unaddressed. Forensic Sci. Int. Digit. Investig. 48: 301671 (2024) - 2023
- [j9]Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo:
Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed. Comput. Secur. 132: 103340 (2023) - [j8]George Grispos, Kim-Kwang Raymond Choo, William Bradley Glisson:
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices. Mob. Networks Appl. 28(4): 1282-1292 (2023) - [c28]William Glisson, George Grispos, Jeffrey Todd McDonald:
Introduction to the Minitrack on Cyber Operations, Defense, and Forensics. HICSS 2023: 6601-6602 - [c27]Aleck Nash, Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo:
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy. ICDF2C (2) 2023: 197-206 - 2022
- [c26]William Glisson, George Grispos, Jeffrey Todd McDonald:
Introduction to the Minitrack on Cyber Operations, Defence, and Forensics. HICSS 2022: 1-2 - [i19]Mark Freyhof, George Grispos, Santosh K. Pitla, Cody Stolle:
Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments. CoRR abs/2205.05866 (2022) - [i18]George Grispos, William R. Mahoney:
Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry. CoRR abs/2208.03607 (2022) - 2021
- [j7]Arafat Al-Dhaqm, Richard Adeyemi Ikuesan, Victor R. Kebande, Shukor Abd Razak, George Grispos, Kim-Kwang Raymond Choo, Bander Ali Saleh Al-Rimy, Abdul Rahman A. Alsewari:
Digital Forensics Subdomains: The State of the Art and Future Directions. IEEE Access 9: 152476-152502 (2021) - [j6]Rushank Shetty, George Grispos, Kim-Kwang Raymond Choo:
Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps. IEEE Trans. Sustain. Comput. 6(2): 197-207 (2021) - [c25]George Grispos, Talon Flynn, William Bradley Glisson, Kim-Kwang Raymond Choo:
Investigating Protected Health Information Leakage from Android Medical Applications. FABULOUS 2021: 311-322 - [c24]Kim-Kwang Raymond Choo, George Grispos, William Bradley Glisson:
Introduction to the Minitrack on Cyber Operations, Defence, and Forensics. HICSS 2021: 1-2 - [c23]Alberto Alejandro Ceballos Delgado, William Bradley Glisson, Narasimha K. Shashidhar, Jeffrey Todd McDonald, George Grispos, Ryan Benton:
Deception Detection Using Machine Learning. HICSS 2021: 1-10 - [c22]Ricardo O. Jacome, Cody Stolle, Ronald K. Faller, George Grispos:
A Dynamically-Concise Roadmap Framework for Guiding Connected and Automated Vehicles. IM 2021: 1009-1017 - [c21]George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. TrustCom 2021: 710-717 - [i17]George Grispos, Talon Flynn, William Bradley Glisson, Kim-Kwang Raymond Choo:
Investigating Protected Health Information Leakage from Android Medical Applications. CoRR abs/2105.07360 (2021) - [i16]George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. CoRR abs/2109.05518 (2021) - 2020
- [c20]George Grispos, Kiran Bastola:
Cyber Autopsies: The Integration of Digital Forensics into Medical Contexts. CBMS 2020: 510-513 - [c19]Talon Flynn, George Grispos, William Bradley Glisson, William Mahoney:
Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack. HICSS 2020: 1-10 - [c18]William Bradley Glisson, George Grispos, Kim-Kwang Raymond Choo:
Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics. HICSS 2020: 1-2 - [e2]Deepak Khazanchi, Harvey P. Siy, George Grispos, Tenace Kwaku Setor:
SIGITE '20: The 21st Annual Conference on Information Technology Education, Virtual Event, USA, October 7-9, 2020. ACM 2020, ISBN 978-1-4503-7045-5 [contents]
2010 – 2019
- 2019
- [c17]George Grispos, William Bradley Glisson, Peter Cooper:
A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices. HICSS 2019: 1-10 - [c16]George Grispos, William Bradley Glisson, Tim Storer:
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations. HICSS 2019: 1-10 - [c15]Daniel S. Bogaard, Hollis J. Greenberg, George Grispos, Bryan S. Goda, Rick Homkes, Kevin McReynolds:
Panel: Online Learning, The Educators Experiences. SIGITE 2019: 99-100 - [e1]Bryan S. Goda, Steve Zilora, George Grispos, Daniel S. Bogaard:
Proceedings of the 20th Annual SIG Conference on Information Technology Education, SIGITE 2019, Tacoma, WA, USA, October 3-5, 2019. ACM 2019, ISBN 978-1-4503-6921-3 [contents] - [i15]George Grispos, William Bradley Glisson, Tim Storer:
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations. CoRR abs/1901.03723 (2019) - [i14]George Grispos, William Bradley Glisson, Peter Cooper:
A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices. CoRR abs/1901.03724 (2019) - 2018
- [c14]Miloslava Plachkinova, George Grispos:
Introduction to the Minitrack on Security and Privacy Challenges for Healthcare. HICSS 2018: 1-2 - [c13]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation Into the Use of Bluetooth Protocols. TrustCom/BigDataSE 2018: 498-503 - [i13]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation into the Use of Bluetooth Protocols. CoRR abs/1808.02153 (2018) - 2017
- [j5]George Grispos, William Bradley Glisson, Tim Storer:
Enhancing security incident response follow-up efforts with lightweight agile retrospectives. Digit. Investig. 22: 62-73 (2017) - [c12]Maureen Van Devender, William Bradley Glisson, Ryan Benton, George Grispos:
Understanding De-identification of Healthcare Big Data. AMCIS 2017 - [c11]George Grispos, William Bradley Glisson, David Bourrie, Tim Storer, Stacy Miller:
Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. AMCIS 2017 - [c10]Shalabh Saini, George Grispos, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications. AMCIS 2017 - [c9]George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo:
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach. CHASE 2017: 108-113 - [c8]Miloslava Plachkinova, George Grispos:
Introduction to Security and Privacy Challenges for Healthcare Minitrack. HICSS 2017: 1-2 - [c7]George Grispos, Jesús García-Galán, Liliana Pasquale, Bashar Nuseibeh:
Are you ready? Towards the engineering of forensic-ready systems. RCIS 2017: 328-333 - [c6]George Grispos, Sorren Hanvey, Bashar Nuseibeh:
Use of organisational topologies for forensic investigations. SERF@ESEC/SIGSOFT FSE 2017: 2-5 - [i12]George Grispos, Jesús García-Galán, Liliana Pasquale, Bashar Nuseibeh:
Are You Ready? Towards the Engineering of Forensic-Ready Systems. CoRR abs/1705.03250 (2017) - [i11]George Grispos, William Bradley Glisson, David Bourrie, Tim Storer, Stacy Miller:
Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. CoRR abs/1706.06818 (2017) - [i10]George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo:
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach. CoRR abs/1708.05374 (2017) - 2016
- [b1]George Grispos:
On the enhancement of data quality in security incident response investigations. University of Glasgow, UK, 2016 - [j4]William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell:
In-The-Wild Residual Data Research and Privacy. J. Digit. Forensics Secur. Law 11(1): 7-36 (2016) - [c5]Jesús García-Galán, Liliana Pasquale, George Grispos, Bashar Nuseibeh:
Towards adaptive compliance. SEAMS@ICSE 2016: 108-114 - [i9]William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell:
In The Wild Residual Data Research and Privacy. CoRR abs/1610.03229 (2016) - [i8]Jesús García-Galán, Liliana Pasquale, George Grispos, Bashar Nuseibeh:
Towards Adaptive Compliance. CoRR abs/1611.05626 (2016) - 2015
- [c4]George Grispos, William Bradley Glisson, Tim Storer:
Security Incident Response Criteria: A Practitioner's Perspective. AMCIS 2015 - [p1]George Grispos, William Bradley Glisson, Tim Storer:
Recovering residual forensic data from smartphone interactions with cloud storage providers. The Cloud Security Ecosystem 2015: 347-382 - [i7]George Grispos, William Bradley Glisson, Tim Storer:
Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers. CoRR abs/1506.02268 (2015) - [i6]George Grispos, William Bradley Glisson, Tim Storer:
Security Incident Response Criteria: A Practitioner's Perspective. CoRR abs/1508.02526 (2015) - 2014
- [c3]George Grispos, William Bradley Glisson, Tim Storer:
Rethinking Security Incident Response: The Integration of Agile Principles. AMCIS 2014 - [i5]George Grispos, William Bradley Glisson, Tim Storer:
Rethinking Security Incident Response: The Integration of Agile Principles. CoRR abs/1408.2431 (2014) - [i4]George Grispos, Tim Storer, William Bradley Glisson:
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. CoRR abs/1410.2123 (2014) - [i3]George Grispos, William Bradley Glisson, John Harold Pardue, Mike Dickson:
Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps. CoRR abs/1411.2132 (2014) - 2013
- [c2]George Grispos, William Bradley Glisson, Tim Storer:
Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization. ECIS 2013: 27 - [c1]George Grispos, William Bradley Glisson, Tim Storer:
Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services. HICSS 2013: 4910-4919 - [i2]George Grispos, William Bradley Glisson, Tim Storer:
Using Smartphones as a Proxy for Forensic Evidence contained in Cloud Storage Services. CoRR abs/1303.4078 (2013) - [i1]George Grispos, William Bradley Glisson, Tim Storer:
Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization. CoRR abs/1306.2477 (2013) - 2012
- [j3]George Grispos, Tim Storer, William Bradley Glisson:
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. Int. J. Digit. Crime Forensics 4(2): 28-48 (2012) - 2011
- [j2]George Grispos, Tim Storer, William Bradley Glisson:
A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digit. Investig. 8(1): 23-36 (2011) - [j1]William Bradley Glisson, Tim Storer, Gavin Mayall, Iain Moug, George Grispos:
Electronic retention: what does your mobile phone reveal about you? Int. J. Inf. Sec. 10(6): 337-349 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint