George Grispos
Orcid: 0000-0003-3468-0182
According to our database1,
George Grispos
authored at least 44 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Internet of things (IoT) forensics and incident response: The good, the bad, and the unaddressed.
Forensic Sci. Int. Digit. Investig., 2024
2023
Comput. Secur., September, 2023
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices.
Mob. Networks Appl., August, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry.
CoRR, 2022
CoRR, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
2021
Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps.
IEEE Trans. Sustain. Comput., 2021
IEEE Access, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
A Dynamically-Concise Roadmap Framework for Guiding Connected and Automated Vehicles.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Investigating Protected Health Information Leakage from Android Medical Applications.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021
2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 33rd IEEE International Symposium on Computer-Based Medical Systems, 2020
2019
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
2017
Enhancing security incident response follow-up efforts with lightweight agile retrospectives.
Digit. Investig., 2017
Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, 2017
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
PhD thesis, 2016
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016
2015
Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers.
CoRR, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
Recovering residual forensic data from smartphone interactions with cloud storage providers.
Proceedings of the Cloud Security Ecosystem, 2015
2014
CoRR, 2014
Proceedings of the 20th Americas Conference on Information Systems, 2014
2013
Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization.
Proceedings of the 21st European Conference on Information Systems, 2013
2012
Int. J. Digit. Crime Forensics, 2012
2011
Int. J. Inf. Sec., 2011
A comparison of forensic evidence recovery techniques for a windows mobile smart phone.
Digit. Investig., 2011