William Bradley Glisson

@latech.edu

Computer Science
Louisiana Tech University



           

https://researchid.co/glisson

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science Applications, Software, Information Systems

2278

Scholar Citations

27

Scholar h-index

52

Scholar i10-index

RECENT SCHOLAR PUBLICATIONS

  • Digital Footprints of Streaming Devices
    S Krishnan, WB Glisson
    arXiv preprint arXiv:2402.06869 2024

  • Introduction to the Minitrack on Cyber Operations, Defense, and Forensics
    J Mcdonald, P Menard, W Glisson
    2024

  • Exploiting a Contact Tracing App to Attack Neighboring Devices
    J Fitzgerald
    Proceedings of the 56th Hawaii International Conference on System Sciences 2023

  • Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices
    G Grispos, KKR Choo, WB Glisson
    Mobile Networks and Applications, 1-11 2022

  • FADE: A forensic image generator for android device education
    AA Ceballos Delgado, WB Glisson, G Grispos, KKR Choo
    Wiley Interdisciplinary Reviews: Forensic Science 4 (2), e1432 2022

  • Walk This Way: Footwear Recognition Using Images & Neural Networks
    V Gazeau, W Glisson, C Varol, Q Liu
    2022

  • Introduction to the Minitrack on Cyber Operations, Defence, and Forensics
    W Glisson, G Grispos, J Mcdonald
    2022

  • Classifying Android Applications Via System Stats
    J Hightower, WB Glisson, R Benton, JT McDonald
    2021 IEEE International Conference on Big Data (Big Data), 5388-5394 2021

  • DIEF: An Autopsy Module for Distributed Identification of E-mail Files from Disk Images
    S Ozcan, M Astekin, WB Glisson, KKR Choo
    2021 IEEE 9th International Conference on Smart City and Informatization 2021

  • A digital forensics investigation of a smart scale iot ecosystem
    G Grispos, F Tursi, KKR Choo, W Mahoney, WB Glisson
    2021 IEEE 20th International Conference on Trust, Security and Privacy in 2021

  • Near-Real-Time IDS for the US FAA’s NextGen ADS-B
    DM Mink, J McDonald, S Bagui, WB Glisson, J Shropshire, R Benton, ...
    Big data and cognitive computing 5 (2), 27 2021

  • Investigating protected health information leakage from android medical applications
    G Grispos, T Flynn, WB Glisson, KKR Choo
    International Conference on Future Access Enablers of Ubiquitous and 2021

  • Machine learning-based android malware detection using manifest permissions
    N Herron, WB Glisson, JT McDonald, RK Benton
    Proceedings of the 54th Hawaii International Conference on System Sciences 2021

  • Detecting Deception Using Machine Learning
    AA Ceballos Delgado, WB Glisson, N Shashidhar, JT McDonald, ...
    Proceedings of the 54th Hawaii International Conference on System Sciences 2021

  • Cyber Operations, Defence and Forensics
    WB Glisson, G Grispos, KKR Choo
    54th Annual Hawaii International Conference on System Sciences, HICSS 2021 2021

  • Deception detection using machine learning
    AA Ceballos Delgado, W Glisson, N Shashidhar, J Mcdonald, G Grispos, ...
    2021

  • Introduction to the Minitrack on Cyber Operations, Defence, and Forensics
    KKR Choo, G Grispos, W Glisson
    2021

  • LinkedLegal: Investigating social media as evidence in courtrooms
    L Graves, WB Glisson, KKR Choo
    Computer Law & Security Review 38, 105408 2020

  • DFS3 automated distributed file system storage state reconstruction
    E Harshany, R Benton, D Bourrie, M Black, W Glisson
    Proceedings of the 15th International Conference on Availability 2020

  • Big data forensics: Hadoop 3.2. 0 reconstruction
    E Harshany, R Benton, D Bourrie, W Glisson
    Forensic Science International: Digital Investigation 32, 300909 2020

MOST CITED SCHOLAR PUBLICATIONS

  • Calm before the storm: The challenges of cloud computing in digital forensics
    G Grispos, T Storer, WB Glisson
    International Journal of Digital Crime and Forensics (IJDCF) 4 (2), 28-48 2012
    Citations: 221

  • Forensic-by-design framework for cyber-physical cloud systems
    NH Ab Rahman, WB Glisson, Y Yang, KKR Choo
    IEEE Cloud Computing 3 (1), 50-59 2016
    Citations: 199

  • Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
    M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
    Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9 2014
    Citations: 101

  • A comparison of forensic evidence recovery techniques for a windows mobile smart phone
    G Grispos, T Storer, WB Glisson
    Digital Investigation 8 (1), 23-36 2011
    Citations: 99

  • Using smartphones as a proxy for forensic evidence contained in cloud storage services
    G Grispos, WB Glisson, T Storer
    2013 46th Hawaii international conference on system sciences, 4910-4919 2013
    Citations: 88

  • Implications of malicious 3D printer firmware
    SB Moore, WB Glisson, M Yampolskiy
    Proceedings of the 50th Hawaii International Conference on System Sciences 2017
    Citations: 78

  • Investigating the increase in mobile phone evidence in criminal activities
    JER McMillan, WB Glisson, M Bromby
    2013 46th Hawaii international conference on system sciences, 4900-4909 2013
    Citations: 76

  • Medical cyber-physical systems development: A forensics-driven approach
    G Grispos, WB Glisson, KKR Choo
    2017 IEEE/ACM International Conference on Connected Health: Applications 2017
    Citations: 75

  • Electronic retention: what does your mobile phone reveal about you?
    WB Glisson, T Storer, G Mayall, I Moug, G Grispos
    International Journal of Information Security 10, 337-349 2011
    Citations: 56

  • CDBFIP: Common database forensic investigation processes for Internet of Things
    A Al-Dhaqm, S Razak, SH Othman, KKR Choo, WB Glisson, A Ali, M Abrar
    IEEE Access 5, 24401-24416 2017
    Citations: 54

  • The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps
    NDW Cahyani, NHA Rahman, WB Glisson, KKR Choo
    Mobile Networks and Applications 22, 240-254 2017
    Citations: 46

  • Recovering residual forensic data from smartphone interactions with cloud storage providers
    G Grispos, WB Glisson, T Storer
    arXiv preprint arXiv:1506.02268 2015
    Citations: 43

  • The cloud security ecosystem: technical, legal, business and management issues
    R Choo, R Ko
    Syngress 2015
    Citations: 43

  • Machine learning-based android malware detection using manifest permissions
    N Herron, WB Glisson, JT McDonald, RK Benton
    Proceedings of the 54th Hawaii International Conference on System Sciences 2021
    Citations: 41

  • Android anti-forensics: Modifying cyanogenmod
    KJ Karlsson, WB Glisson
    2014 47th Hawaii International Conference on System Sciences, 4828-4837 2014
    Citations: 40

  • Investigating the Impact of Global Positioning System Evidence
    KJ Berman, WB Glisson, LM Glisson
    2015
    Citations: 39

  • Web development evolution: The assimilation of web engineering security
    WB Glisson, R Welland
    Third Latin American Web Congress (LA-WEB'2005), 5 pp. 2005
    Citations: 39

  • Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
    G Grispos, WB Glisson, T Storer
    arXiv preprint arXiv:1306.2477 2013
    Citations: 38

  • A malicious attack on the machine learning policy of a robotic system
    G Clark, M Doran, W Glisson
    2018 17th IEEE International Conference On Trust, Security And Privacy In 2018
    Citations: 37

  • Rethinking security incident response: The integration of agile principles
    G Grispos, WB Glisson, T Storer
    arXiv preprint arXiv:1408.2431 2014
    Citations: 37