Tim Storer

Orcid: 0000-0002-4026-097X

According to our database1, Tim Storer authored at least 46 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Case Study of DevOps Adoption within a Large Financial Organisation.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2023

2022
Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022

2021
Sciit: Embedding issue tracking in source control management.
Sci. Comput. Program., 2021

Designing a mobile game to generate player data - lessons learned.
CoRR, 2021

Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
A case study of agile software development for safety-Critical systems projects.
Reliab. Eng. Syst. Saf., 2020

2019
Behave Nicely! Automatic Generation of Code for Behaviour Driven Development Test Suites.
Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation, 2019

Sciit: Aligning Source Control Management and Issue Tracking Architectures.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

Estimating Software Task Effort in Crowds.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

"<i>I do it because they do it</i>": Social-Neutralisation in Information Security Practices of Saudi Medical Interns.
Proceedings of the Risks and Security of Internet and Systems, 2019

Understanding Abusive Behaviour Between Online and Offline Group Discussions.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Third-party verifiable voting systems: Addressing motivation and incentives in e-voting.
J. Inf. Secur. Appl., 2018

Process Fuzzing as an Approach to Genetic Programming.
Proceedings of the SICSA Workshop on Reasoning, 2018

Analyzing Privacy Policies of Zero Knowledge Cloud Storage Applications on Mobile Devices.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Modelling Realistic User Behaviour in Information Systems Simulations as Fuzzing Aspects.
Proceedings of the Information Systems in the Big Data Era, 2018

2017
Enhancing security incident response follow-up efforts with lightweight agile retrospectives.
Digit. Investig., 2017

Bridging the Chasm: A Survey of Software Engineering Practice in Scientific Programming.
ACM Comput. Surv., 2017

Experimenting with Realism in Software Engineering Team Projects: An Experience Report.
Proceedings of the 30th IEEE Conference on Software Engineering Education and Training, 2017

Security Incident Recognition and Reporting (SIRR): An Industrial Perspective.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Does CloudSim Accurately Model Micro Datacenters?
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
In-The-Wild Residual Data Research and Privacy.
J. Digit. Forensics Secur. Law, 2016

2015
Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers.
CoRR, 2015

Formalising Responsibility Modelling for Automatic Analysis.
Proceedings of the Enterprise and Organizational Modeling and Simulation, 2015

Security Incident Response Criteria: A Practitioner's Perspective.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Recovering residual forensic data from smartphone interactions with cloud storage providers.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Rethinking Security Incident Response: The Integration of Agile Principles.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
An empirical comparison of data recovered from mobile forensic toolkits.
Digit. Investig., 2013

A framework for continuous, transparent mobile device authentication.
Comput. Secur., 2013

Encouraging second thoughts: Obstructive user interfaces for raising security awareness.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Comparison of the Data Recovery Function of Forensic Tools.
Proceedings of the Advances in Digital Forensics IX, 2013

Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization.
Proceedings of the 21st European Conference on Information Systems, 2013

Investigating Information Security Risks of Mobile Device Use within Organizations.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics.
Int. J. Digit. Crime Forensics, 2012

Information Requirements for Enterprise Systems.
Proceedings of the Large-Scale Complex IT Systems. Development, Operation and Management, 2012

2011
Electronic retention: what does your mobile phone reveal about you?
Int. J. Inf. Sec., 2011

A comparison of forensic evidence recovery techniques for a windows mobile smart phone.
Digit. Investig., 2011

Augmenting password recovery with online profiling.
Digit. Investig., 2011

Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

2009
Deriving Information Requirements from Responsibility Models.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009

Accuracy: The Fundamental Requirement for Voting Systems.
Proceedings of the The Forth International Conference on Availability, 2009

2007
An Evaluation Framework for Grid-based Learning Technologies.
Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, 2007

2005
Electronic Voting in the UK: Current Trends in Deployment , Requirements and Technologies.
Proceedings of the Third Annual Conference on Privacy, 2005

Two Variations to the mCESG Pollsterless E-Voting Scheme.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Practical Remote Electronic Elections for the UK.
Proceedings of the Second Annual Conference on Privacy, 2004


  Loading...