William Glisson

Orcid: 0000-0002-8769-1646

According to our database1, William Glisson authored at least 87 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Digital Footprints of Streaming Devices.
CoRR, 2024

Introduction to the Minitrack on Cyber Operations, Defense, and Forensics.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices.
Mob. Networks Appl., August, 2023

Introduction to the Minitrack on Cyber Operations, Defense, and Forensics.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Exploiting a Contact Tracing App to Attack Neighboring Devices.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Introduction to the Minitrack on Cyber Operations, Defence, and Forensics.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Walk This Way: Footwear Recognition Using Images & Neural Networks.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B.
Big Data Cogn. Comput., 2021

A Digital Forensics Investigation of a Smart Scale IoT Ecosystem.
Proceedings of the 20th IEEE International Conference on Trust, 2021

DIEF: An Autopsy Module for Distributed Identification of E-mail Files from Disk Images.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

Machine Learning-Based Android Malware Detection Using Manifest Permissions.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Deception Detection Using Machine Learning.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Introduction to the Minitrack on Cyber Operations, Defence, and Forensics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Investigating Protected Health Information Leakage from Android Medical Applications.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021

Classifying Android Applications Via System Stats.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Big Data Forensics: Hadoop 3.2.0 Reconstruction.
Digit. Investig., 2020

LinkedLegal: Investigating social media as evidence in courtrooms.
Comput. Law Secur. Rev., 2020

Detecting Repackaged Android Applications Using Perceptual Hashing.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Network Attack Detection Using an Unsupervised Machine Learning Algorithm.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

DFS<sup>3</sup>: automated distributed file system storage state reconstruction.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Insight from a Docker Container Introspection.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Investigating 3D Printer Residual Data.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Risk Analysis of Residual Protected Health Information of Android Telehealth Apps.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
Identifying stealth malware using CPU power consumption and learning algorithms.
J. Comput. Secur., 2018

Identifying 3D printer residual data via open-source documentation.
Comput. Secur., 2018

Internet- and cloud-of-things cybersecurity research challenges and advances.
Comput. Secur., 2018

Cloud forecasting: Legal visibility issues in saturated environments.
Comput. Law Secur. Rev., 2018

Digital Blues: An Investigation Into the Use of Bluetooth Protocols.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Browser Analysis of Residual Facebook Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Malicious Attack on the Machine Learning Policy of a Robotic System.
Proceedings of the 17th IEEE International Conference On Trust, 2018

MedDevRisk: Risk Analysis Methodology for Networked Medical Devices.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps.
Mob. Networks Appl., 2017

Enhancing security incident response follow-up efforts with lightweight agile retrospectives.
Digit. Investig., 2017

CDBFIP: Common Database Forensic Investigation Processes for Internet of Things.
IEEE Access, 2017

Enhanced Operating System Protection to Support Digital Forensic Investigations.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Manipulating the Five V's in the Next Generation Air Transportation System.
Proceedings of the Security and Privacy in Communication Networks, 2017

Exploitation and Detection of a Malicious Mobile Application.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Implications of Malicious 3D Printer Firmware.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Introduction to Cyber-of-Things: Cyber-crimes and Cyber-Security Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Medical Cyber-Physical Systems Development: A Forensics-Driven Approach.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Security Incident Recognition and Reporting (SIRR): An Industrial Perspective.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Understanding De-identification of Healthcare Big Data.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
In-The-Wild Residual Data Research and Privacy.
J. Digit. Forensics Secur. Law, 2016

Towards Security of Additive Layer Manufacturing.
CoRR, 2016

Forensic-by-Design Framework for Cyber-Physical Cloud Systems.
IEEE Cloud Comput., 2016

The role of mobile forensics in terrorism investigations involving the use of cloud apps.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Utilizing the Cloud to Store Hijacked Camera Images.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Introduction to the Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges Minitrack.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Next Generation Aircraft Architecture and Digital Forensic.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Identifying Opportunities to Compromise Medical Devices.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers.
CoRR, 2015

Investigating the Impact of Global Positioning System Evidence.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Security Incident Response Criteria: A Practitioner's Perspective.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Compromising a Medical Mannequin.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Recovering residual forensic data from smartphone interactions with cloud storage providers.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps.
CoRR, 2014

Web Engineering Security (WES) Methodology.
Commun. Assoc. Inf. Syst., 2014

Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts.
Proceedings of the Fifth Information Interaction in Context Symposium, 2014

Android Anti-forensics: Modifying CyanogenMod.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Rethinking Security Incident Response: The Integration of Agile Principles.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014

2013
An empirical comparison of data recovered from mobile forensic toolkits.
Digit. Investig., 2013

Comparison of the Data Recovery Function of Forensic Tools.
Proceedings of the Advances in Digital Forensics IX, 2013

Investigating the Increase in Mobile Phone Evidence in Criminal Activities.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization.
Proceedings of the 21st European Conference on Information Systems, 2013

Investigating Information Security Risks of Mobile Device Use within Organizations.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics.
Int. J. Digit. Crime Forensics, 2012

2011
Electronic retention: what does your mobile phone reveal about you?
Int. J. Inf. Sec., 2011

A comparison of forensic evidence recovery techniques for a windows mobile smart phone.
Digit. Investig., 2011

Augmenting password recovery with online profiling.
Digit. Investig., 2011

Exploring solutions put forth to solve computer forensic investigations of large storage media.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

2010
Initial Case Study on "the Good, the Bad and the Ugly" Aspects of a New MSc Program in Computer Forensics and E-Discovery.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2008
The Web Engineering Security (WES) methodology.
PhD thesis, 2008

2007
Web Engineering Security: Essential Elements.
Proceedings of the The Second International Conference on Availability, 2007

Secure Web Application Development and Global Regulation.
Proceedings of the The Second International Conference on Availability, 2007

2006
Large-Scale Dispensing for Emergency Response to Bioterrorism and Infectious-Disease Outbreak.
Interfaces, 2006

Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks.
Ann. Oper. Res., 2006

Web engineering security: a practitioner's perspective.
Proceedings of the 6th International Conference on Web Engineering, 2006

2005
Web Development Evolution: The Assimilation of Web Engineering Security.
Proceedings of the Third Latin American Web Congress (LA-Web 2005), 1 October, 2005


  Loading...