Seguir
Tim Storer
Tim Storer
Senior Lecturer in Software Engineering, School of Computing Science, University of Glasgow
Dirección de correo verificada de glasgow.ac.uk
Título
Citado por
Citado por
Año
Calm before the storm: The challenges of cloud computing in digital forensics
G Grispos, T Storer, WB Glisson
International Journal of Digital Crime and Forensics (IJDCF) 4 (2), 28-48, 2012
2142012
A framework for continuous, transparent mobile device authentication
H Crawford, K Renaud, T Storer
Computers & Security 39, 127-136, 2013
1322013
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
G Grispos, T Storer, WB Glisson
Digital Investigation 8 (1), 23-36, 2011
992011
Using smartphones as a proxy for forensic evidence contained in cloud storage services
G Grispos, WB Glisson, T Storer
2013 46th Hawaii international conference on system sciences, 4910-4919, 2013
882013
Bridging the chasm: A survey of software engineering practice in scientific programming
T Storer
ACM Computing Surveys (CSUR) 50 (4), 1-32, 2017
742017
A case study of agile software development for safety-Critical systems projects
G Islam, T Storer
Reliability Engineering & System Safety 200, 106954, 2020
582020
Deriving information requirements from responsibility models
I Sommerville, R Lock, T Storer, J Dobson
Advanced Information Systems Engineering: 21st International Conference …, 2009
552009
Electronic retention: what does your mobile phone reveal about you?
WB Glisson, T Storer, G Mayall, I Moug, G Grispos
International Journal of Information Security 10, 337-349, 2011
542011
Recovering residual forensic data from smartphone interactions with cloud storage providers
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1506.02268, 2015
432015
Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1306.2477, 2013
382013
Rethinking security incident response: The integration of agile principles
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1408.2431, 2014
372014
Security incident response criteria: A practitioner's perspective
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1508.02526, 2015
342015
An empirical comparison of data recovered from mobile forensic toolkits
WB Glisson, T Storer, J Buchanan-Wollaston
Digital Investigation 10 (1), 44-55, 2013
292013
How good is your data? Investigating the quality of data generated during security incident response investigations
G Grispos, WB Glisson, T Storer
arXiv preprint arXiv:1901.03723, 2019
282019
Investigating information security risks of mobile device use within organizations
WB Glisson, T Storer
arXiv preprint arXiv:1309.0521, 2013
262013
Responsibility modelling for civil emergency planning
I Sommerville, T Storer, R Lock
Risk Management 11 (3), 179-207, 2009
262009
Responsibility modelling for risk analysis
R Lock, T Storer, I Sommerville
262009
Enhancing security incident response follow-up efforts with lightweight agile retrospectives
G Grispos, WB Glisson, T Storer
Digital Investigation 22, 62-73, 2017
252017
Polsterless remote electronic voting
T Storer, I Duncan
Journal of E-government 1 (1), 75-103, 2004
232004
Playing planning poker in crowds: human computation of software effort estimates
M Alhamed, T Storer
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 1-12, 2021
212021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20