Forensic investigation of cloud computing systems M Taylor, J Haggerty, D Gresty, D Lamb Network Security 2011 (3), 4-10, 2011 | 196 | 2011 |
Digital evidence in cloud computing systems M Taylor, J Haggerty, D Gresty, R Hegarty Computer law & security review 26 (3), 304-308, 2010 | 190 | 2010 |
Computer game-flow design MJ Taylor, D Gresty, M Baskett Computers in Entertainment (CIE) 4 (1), 5-es, 2006 | 58 | 2006 |
Forensic investigation of social networking applications M Taylor, J Haggerty, D Gresty, P Almond, T Berry Network Security 2014 (11), 9-16, 2014 | 37 | 2014 |
Knowledge for Web site development MJ Taylor, D England, D Gresty Internet research 11 (5), 451-461, 2001 | 27 | 2001 |
Requirements for a general framework for response to distributed denial-of-service DW Gresty, Q Shi, M Merabti Seventeenth Annual Computer Security Applications Conference, 422-429, 2001 | 26 | 2001 |
Avoiding the misuse of social media by employees M Taylor, J Haggerty, D Gresty, C Wren, T Berry Network Security 2016 (5), 8-11, 2016 | 17 | 2016 |
Digital evidence from mobile telephone applications M Taylor, G Hughes, J Haggerty, D Gresty, P Almond Computer Law & Security Review 28 (3), 335-339, 2012 | 17 | 2012 |
The legal aspects of corporate computer forensic investigations M Taylor, J Haggerty, D Gresty Computer Law & Security Review 23 (6), 562-566, 2007 | 17 | 2007 |
Consensus structural models for the amino terminal domain of the retrovirus restriction gene Fv1 and the Murine Leukaemia Virus capsid proteins WR Taylor, JP Stoye BMC Structural Biology 4, 1-15, 2004 | 14 | 2004 |
Investigating employee harassment via social media M Taylor, J Haggerty, D Gresty, N Criado Pacheco, T Berry, P Almond Journal of Systems and Information Technology 17 (4), 322-335, 2015 | 13 | 2015 |
The legal aspects of corporate e-mail investigations M Taylor, J Haggerty, D Gresty Computer Law & Security Review 25 (4), 372-376, 2009 | 12 | 2009 |
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history DW Gresty, D Gan, G Loukas, C Ierotheou Digital Investigation 16, S124-S133, 2016 | 11 | 2016 |
Determining culpability in investigations of malicious e-mail dissemination within the organisation J Haggerty, M Taylor, D Gresty 2008 Third International Annual Workshop on Digital Forensics and Incident …, 2008 | 11 | 2008 |
The legal aspects of corporate computer usage policies M Taylor, J Haggerty, D Gresty Computer Law & Security Review 26 (1), 72-76, 2010 | 10 | 2010 |
Knowledge for network support MJ Taylor, D Gresty, R Askwith Information and software technology 43 (8), 469-475, 2001 | 9 | 2001 |
Forensic investigation of peer-to-peer networks M Taylor, J Haggerty, D Gresty, P Fergus Network Security 2010 (9), 12-15, 2010 | 8 | 2010 |
Digital evidence from peer-to-peer networks M Taylor, J Haggerty, D Gresty, T Berry Computer Law & Security Review 27 (6), 647-652, 2011 | 7 | 2011 |
Teaching business IT ethics: a professional approach MJ Taylor, E Moynihan, J Mcwilliam, D Gresty Active learning in higher education 5 (1), 43-55, 2004 | 7 | 2004 |
Legal considerations for cyber-activism. DW Gresty, MJ Taylor, J Lunn Systems Research and Behavioral Science 22 (6), 565-571, 2005 | 5 | 2005 |