Collections in this community

Recent Submissions

  • In-The-Wild Residual Data Research and Privacy 

    Glisson, William Bradley; Storer, Tim; Blyth, Andrew; Grispos, George; Campbell, Matt (Journal of Digital Forensics, Security and Law, 2016)
    As the world becomes increasingly dependent on technology, researchers in industry and academia endeavor to understand how technology is used, the impact it has on everyday life, the artifact life-cycle and overall ...
  • CDBFIP: Common Database Forensic Investigation Processes for Internet of Things 

    Al-Dhaqm, Arafat; Razak, Shukor; Othman, Siti Hajar; Choo, Kim-Kwang Raymond; Glisson, William Bradley; Ali, Abulalem; Abrar, Mohammad (IEEE Access, 2017-10)
    Database forensics is a domain that uses database content and metadata to reveal malicious activities on database systems in an Internet of Things environment. Although the concept of database forensics has been around for ...
  • Cloud Forecasting: Legal Visibility Issues in Saturated Environments 

    Brown, Adam J.; Glisson, William Bradley; Andel, Todd R.; Choo, Kim-Kwang Raymond (Computer Law & Security Review, 2018)
    The advent of cloud computing has brought the computing power of corporate data pro- cessing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices ...
  • Identifying stealth malware using CPU power consumption and learning algorithms 

    Lucket, Patrick; McDonald, J. Todd; Glisson, William Bradley; Benton, Ryan; Dawson, Joel; Doyle, Blair A. (Journal of Computer Security, 2018)
    With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...