Segueix
Tim Storer
Tim Storer
Senior Lecturer in Software Engineering, School of Computing Science, University of Glasgow
Correu electrònic verificat a glasgow.ac.uk
Títol
Citada per
Citada per
Any
Calm before the storm: The challenges of cloud computing in digital forensics
G Grispos, T Storer, WB Glisson
Emerging digital forensics applications for crime detection, prevention, and …, 2013
2232013
A framework for continuous, transparent mobile device authentication
H Crawford, K Renaud, T Storer
Computers & Security 39, 127-136, 2013
1362013
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
G Grispos, T Storer, WB Glisson
Digital Investigation 8 (1), 23-36, 2011
982011
Bridging the chasm: A survey of software engineering practice in scientific programming
T Storer
ACM Computing Surveys (CSUR) 50 (4), 1-32, 2017
882017
Using smartphones as a proxy for forensic evidence contained in cloud storage services
G Grispos, WB Glisson, T Storer
2013 46th Hawaii international conference on system sciences, 4910-4919, 2013
882013
A case study of agile software development for safety-Critical systems projects
G Islam, T Storer
Reliability Engineering & System Safety 200, 106954, 2020
702020
Electronic retention: what does your mobile phone reveal about you?
WB Glisson, T Storer, G Mayall, I Moug, G Grispos
International Journal of Information Security 10, 337-349, 2011
582011
Deriving information requirements from responsibility models
I Sommerville, R Lock, T Storer, J Dobson
Advanced Information Systems Engineering: 21st International Conference …, 2009
562009
Recovering residual forensic data from smartphone interactions with cloud storage providers
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1506.02268, 2015
422015
Rethinking security incident response: The integration of agile principles
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1408.2431, 2014
402014
Security incident response criteria: A practitioner's perspective
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1508.02526, 2015
372015
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1306.2477, 2013
372013
How good is your data? Investigating the quality of data generated during security incident response investigations
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1901.03723, 2019
332019
An empirical comparison of data recovered from mobile forensic toolkits
WB Glisson, T Storer, J Buchanan-Wollaston
Digital Investigation 10 (1), 44-55, 2013
312013
Enhancing security incident response follow-up efforts with lightweight agile retrospectives
G Grispos, WB Glisson, T Storer
Digital Investigation 22, 62-73, 2017
292017
Responsibility modelling for civil emergency planning
I Sommerville, T Storer, R Lock
Risk Management 11 (3), 179-207, 2009
282009
Investigating information security risks of mobile device use within organizations
WB Glisson, T Storer
arXiv preprint arXiv:1309.0521, 2013
272013
Responsibility modelling for risk analysis
R Lock, T Storer, I Sommerville
272009
Experimenting with realism in software engineering team projects: An experience report
R Simpson, T Storer
2017 IEEE 30th Conference on Software Engineering Education and Training …, 2017
262017
Playing planning poker in crowds: human computation of software effort estimates
M Alhamed, T Storer
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 1-12, 2021
252021
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20