Calm before the storm: The challenges of cloud computing in digital forensics G Grispos, T Storer, WB Glisson Emerging digital forensics applications for crime detection, prevention, and …, 2013 | 223 | 2013 |
A framework for continuous, transparent mobile device authentication H Crawford, K Renaud, T Storer Computers & Security 39, 127-136, 2013 | 136 | 2013 |
A comparison of forensic evidence recovery techniques for a windows mobile smart phone G Grispos, T Storer, WB Glisson Digital Investigation 8 (1), 23-36, 2011 | 98 | 2011 |
Bridging the chasm: A survey of software engineering practice in scientific programming T Storer ACM Computing Surveys (CSUR) 50 (4), 1-32, 2017 | 88 | 2017 |
Using smartphones as a proxy for forensic evidence contained in cloud storage services G Grispos, WB Glisson, T Storer 2013 46th Hawaii international conference on system sciences, 4910-4919, 2013 | 88 | 2013 |
A case study of agile software development for safety-Critical systems projects G Islam, T Storer Reliability Engineering & System Safety 200, 106954, 2020 | 70 | 2020 |
Electronic retention: what does your mobile phone reveal about you? WB Glisson, T Storer, G Mayall, I Moug, G Grispos International Journal of Information Security 10, 337-349, 2011 | 58 | 2011 |
Deriving information requirements from responsibility models I Sommerville, R Lock, T Storer, J Dobson Advanced Information Systems Engineering: 21st International Conference …, 2009 | 56 | 2009 |
Recovering residual forensic data from smartphone interactions with cloud storage providers G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1506.02268, 2015 | 42 | 2015 |
Rethinking security incident response: The integration of agile principles G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1408.2431, 2014 | 40 | 2014 |
Security incident response criteria: A practitioner's perspective G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1508.02526, 2015 | 37 | 2015 |
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1306.2477, 2013 | 37 | 2013 |
How good is your data? Investigating the quality of data generated during security incident response investigations G Grispos, WB Glisson, T Storer arXiv preprint arXiv:1901.03723, 2019 | 33 | 2019 |
An empirical comparison of data recovered from mobile forensic toolkits WB Glisson, T Storer, J Buchanan-Wollaston Digital Investigation 10 (1), 44-55, 2013 | 31 | 2013 |
Enhancing security incident response follow-up efforts with lightweight agile retrospectives G Grispos, WB Glisson, T Storer Digital Investigation 22, 62-73, 2017 | 29 | 2017 |
Responsibility modelling for civil emergency planning I Sommerville, T Storer, R Lock Risk Management 11 (3), 179-207, 2009 | 28 | 2009 |
Investigating information security risks of mobile device use within organizations WB Glisson, T Storer arXiv preprint arXiv:1309.0521, 2013 | 27 | 2013 |
Responsibility modelling for risk analysis R Lock, T Storer, I Sommerville | 27 | 2009 |
Experimenting with realism in software engineering team projects: An experience report R Simpson, T Storer 2017 IEEE 30th Conference on Software Engineering Education and Training …, 2017 | 26 | 2017 |
Playing planning poker in crowds: human computation of software effort estimates M Alhamed, T Storer 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 1-12, 2021 | 25 | 2021 |