David W Gresty
David W Gresty
Senior Lecturer, University of Greenwich
Verified email at greenwich.ac.uk
TitleCited byYear
Forensic investigation of cloud computing systems
M Taylor, J Haggerty, D Gresty, D Lamb
Network Security 2011 (3), 4-10, 2011
1592011
Digital evidence in cloud computing systems
M Taylor, J Haggerty, D Gresty, R Hegarty
Computer law & security review 26 (3), 304-308, 2010
1452010
Consensus structural models for the amino terminal domain of the retrovirus restriction gene Fv1 and the murine leukaemia virus capsid proteins
WR Taylor, JP Stoye
BMC structural biology 4 (1), 1, 2004
592004
Forensic investigation of social networking applications
M Taylor, J Haggerty, D Gresty, P Almond, T Berry
Network Security 2014 (11), 9-16, 2014
252014
Knowledge for Web site development
MJ Taylor, D England, D Gresty
Internet research 11 (5), 451-461, 2001
252001
Requirements for a general framework for response to distributed denial-of-service
DW Gresty, Q Shi, M Merabti
Seventeenth Annual Computer Security Applications Conference, 422-429, 2001
212001
The legal aspects of corporate computer forensic investigations
M Taylor, J Haggerty, D Gresty
Computer Law & Security Review 23 (6), 562-566, 2007
152007
Digital evidence from mobile telephone applications
M Taylor, G Hughes, J Haggerty, D Gresty, P Almond
Computer Law & Security Review 28 (3), 335-339, 2012
122012
The legal aspects of corporate e-mail investigations
M Taylor, J Haggerty, D Gresty
Computer Law & Security Review 25 (4), 372-376, 2009
122009
Determining culpability in investigations of malicious e-Mail dissemination within the organisation
J Haggerty, M Taylor, D Gresty
2008 Third International Annual Workshop on Digital Forensics and Incident …, 2008
112008
Investigating employee harassment via social media
M Taylor, J Haggerty, D Gresty, NC Pacheco, T Berry, P Almond
Journal of Systems and Information Technology, 2015
92015
The legal aspects of corporate computer usage policies
M Taylor, J Haggerty, D Gresty
Computer Law & Security Review 26 (1), 72-76, 2010
92010
Forensic investigation of peer-to-peer networks
M Taylor, J Haggerty, D Gresty, P Fergus
Network Security 2010 (9), 12-15, 2010
82010
Knowledge for network support
MJ Taylor, D Gresty, R Askwith
Information and software technology 43 (8), 469-475, 2001
82001
Digital evidence from peer-to-peer networks
M Taylor, J Haggerty, D Gresty, T Berry
Computer Law & Security Review 27 (6), 647-652, 2011
72011
Teaching business IT ethics: a professional approach
MJ Taylor, E Moynihan, J Mcwilliam, D Gresty
Active learning in higher education 5 (1), 43-55, 2004
62004
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history
DW Gresty, D Gan, G Loukas, C Ierotheou
Digital Investigation 16, S124-S133, 2016
52016
Cyber law: Case studies in the SME environment
MJ Taylor, J McWilliam, D Gresty, M Hanneghan
Systems Research and Behavioral Science 22 (3), 261, 2005
42005
Avoiding the misuse of social media by employees
M Taylor, J Haggerty, D Gresty, C Wren, T Berry
Network Security 2016 (5), 8-11, 2016
32016
Legal considerations for cyber-activism
DW Gresty, MJ Taylor, J Lunn
Systems Research and Behavioral Science 22 (6), 565-571, 2005
32005
The system can't perform the operation now. Try again later.
Articles 1–20