George Grispos

Orcid: 0000-0003-3468-0182

According to our database1, George Grispos authored at least 42 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed.
Comput. Secur., September, 2023

Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Introduction to the Minitrack on Cyber Operations, Defense, and Forensics.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry.
CoRR, 2022

Towards a Cybersecurity Testbed for Agricultural Vehicles and Environments.
CoRR, 2022

Introduction to the Minitrack on Cyber Operations, Defence, and Forensics.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps.
IEEE Trans. Sustain. Comput., 2021

Digital Forensics Subdomains: The State of the Art and Future Directions.
IEEE Access, 2021

A Digital Forensics Investigation of a Smart Scale IoT Ecosystem.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Dynamically-Concise Roadmap Framework for Guiding Connected and Automated Vehicles.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Deception Detection Using Machine Learning.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Introduction to the Minitrack on Cyber Operations, Defence, and Forensics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Investigating Protected Health Information Leakage from Android Medical Applications.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021

2020
Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Cyber Autopsies: The Integration of Digital Forensics into Medical Contexts.
Proceedings of the 33rd IEEE International Symposium on Computer-Based Medical Systems, 2020

2019
Panel: Online Learning, The Educators Experiences.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Digital Blues: An Investigation Into the Use of Bluetooth Protocols.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Introduction to the Minitrack on Security and Privacy Challenges for Healthcare.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
Enhancing security incident response follow-up efforts with lightweight agile retrospectives.
Digit. Investig., 2017

Use of organisational topologies for forensic investigations.
Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, 2017

Are you ready? Towards the engineering of forensic-ready systems.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Introduction to Security and Privacy Challenges for Healthcare Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Medical Cyber-Physical Systems Development: A Forensics-Driven Approach.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Security Incident Recognition and Reporting (SIRR): An Industrial Perspective.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Understanding De-identification of Healthcare Big Data.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
On the enhancement of data quality in security incident response investigations.
PhD thesis, 2016

In-The-Wild Residual Data Research and Privacy.
J. Digit. Forensics Secur. Law, 2016

Towards adaptive compliance.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

2015
Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers.
CoRR, 2015

Security Incident Response Criteria: A Practitioner's Perspective.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Recovering residual forensic data from smartphone interactions with cloud storage providers.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps.
CoRR, 2014

Rethinking Security Incident Response: The Integration of Agile Principles.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization.
Proceedings of the 21st European Conference on Information Systems, 2013

2012
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics.
Int. J. Digit. Crime Forensics, 2012

2011
Electronic retention: what does your mobile phone reveal about you?
Int. J. Inf. Sec., 2011

A comparison of forensic evidence recovery techniques for a windows mobile smart phone.
Digit. Investig., 2011


  Loading...