Follow
David W Gresty
David W Gresty
Senior Lecturer, University of Greenwich
Verified email at greenwich.ac.uk
Title
Cited by
Cited by
Year
Forensic investigation of cloud computing systems
M Taylor, J Haggerty, D Gresty, D Lamb
Network Security 2011 (3), 4-10, 2011
1962011
Digital evidence in cloud computing systems
M Taylor, J Haggerty, D Gresty, R Hegarty
Computer law & security review 26 (3), 304-308, 2010
1902010
Computer game-flow design
MJ Taylor, D Gresty, M Baskett
Computers in Entertainment (CIE) 4 (1), 5-es, 2006
582006
Forensic investigation of social networking applications
M Taylor, J Haggerty, D Gresty, P Almond, T Berry
Network Security 2014 (11), 9-16, 2014
372014
Knowledge for Web site development
MJ Taylor, D England, D Gresty
Internet research 11 (5), 451-461, 2001
272001
Requirements for a general framework for response to distributed denial-of-service
DW Gresty, Q Shi, M Merabti
Seventeenth Annual Computer Security Applications Conference, 422-429, 2001
262001
Digital evidence from mobile telephone applications
M Taylor, G Hughes, J Haggerty, D Gresty, P Almond
Computer Law & Security Review 28 (3), 335-339, 2012
182012
Avoiding the misuse of social media by employees
M Taylor, J Haggerty, D Gresty, C Wren, T Berry
Network Security 2016 (5), 8-11, 2016
172016
The legal aspects of corporate computer forensic investigations
M Taylor, J Haggerty, D Gresty
Computer Law & Security Review 23 (6), 562-566, 2007
172007
Consensus structural models for the amino terminal domain of the retrovirus restriction gene Fv1 and the Murine Leukaemia Virus capsid proteins
WR Taylor, JP Stoye
BMC Structural Biology 4, 1-15, 2004
142004
Investigating employee harassment via social media
M Taylor, J Haggerty, D Gresty, N Criado Pacheco, T Berry, P Almond
Journal of Systems and Information Technology 17 (4), 322-335, 2015
132015
The legal aspects of corporate e-mail investigations
M Taylor, J Haggerty, D Gresty
Computer Law & Security Review 25 (4), 372-376, 2009
122009
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history
DW Gresty, D Gan, G Loukas, C Ierotheou
Digital Investigation 16, S124-S133, 2016
112016
Determining culpability in investigations of malicious e-mail dissemination within the organisation
J Haggerty, M Taylor, D Gresty
2008 Third International Annual Workshop on Digital Forensics and Incident …, 2008
112008
The legal aspects of corporate computer usage policies
M Taylor, J Haggerty, D Gresty
Computer Law & Security Review 26 (1), 72-76, 2010
102010
Knowledge for network support
MJ Taylor, D Gresty, R Askwith
Information and software technology 43 (8), 469-475, 2001
92001
Forensic investigation of peer-to-peer networks
M Taylor, J Haggerty, D Gresty, P Fergus
Network Security 2010 (9), 12-15, 2010
82010
Digital evidence from peer-to-peer networks
M Taylor, J Haggerty, D Gresty, T Berry
Computer Law & Security Review 27 (6), 647-652, 2011
72011
Teaching business IT ethics: a professional approach
MJ Taylor, E Moynihan, J Mcwilliam, D Gresty
Active learning in higher education 5 (1), 43-55, 2004
72004
Legal considerations for cyber-activism.
DW Gresty, MJ Taylor, J Lunn
Systems Research and Behavioral Science 22 (6), 565-571, 2005
52005
The system can't perform the operation now. Try again later.
Articles 1–20