Key details
David Gresty
Senior Lecturer
Responsibilities within the university
Undergraduate and Postgraduate Project Supervision for Forensics and Cyber Security
Course leader 2019/20
Computer Forensics 2
Teaching and Lab support (From 2014)
Computer Forensics 2
Computer Forensics 3
Cyber Crime and Forensics
Information Security
Research / Scholarly interests
Forensics in the IoT crime scene
Confidence in digital forensics expert evidence
Internet History and Pattern of Life Analysis
Recent publications
Gan, D., Chadwick, D., Gresty, D., Vuong, T. and Phillips, E., 2017, December. Experiential and Simulated Learning: An Interdisciplinary Approach. In 2017 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 1183-1186). IEEE.
Gresty, D.W., Loukas, G., Gan, D. and Ierotheou, C., 2017, June. Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 365-372). IEEE.
Taylor, M., Haggerty, J., Gresty, D., Wren, C. and Berry, T., 2016. Avoiding the misuse of social media by employees. Network Security, 2016(5), pp.8-11.
Gresty, D.W., Gan, D., Loukas, G. and Ierotheou, C., 2016. Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history. Digital Investigation, 16, pp.S124-S133.
Taylor, M., Haggerty, J., Gresty, D., Criado Pacheco, N., Berry, T. and Almond, P., 2015. Investigating employee harassment via social media. Journal of Systems and Information Technology, 17(4), pp.322-335.
Taylor, M., Haggerty, J., Gresty, D., Almond, P. and Berry, T., 2014. Forensic investigation of social networking applications. Network Security, 2014(11), pp.9-16.
Gresty, D.W., Gan, D. and Loukas, G., Digital Forensic Analysis of Internet History Using Principal Component Analysis. 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 237-242, Liverpool, UK (June 23–24 2014)
Taylor, M., Hughes, G., Haggerty, J., Gresty, D. and Almond, P., 2012. Digital evidence from mobile telephone applications. Computer Law & Security Review, 28(3), pp.335-339.
Taylor, M., Haggerty, J., Gresty, D. and Berry, T., 2011. Digital evidence from peer-to-peer networks. Computer Law & Security Review, 27(6), pp.647-652.
Taylor, M., Haggerty, J., Gresty, D. and Lamb, D., 2011. Forensic investigation of cloud computing systems. Network Security, 2011(3), pp.4-10.
Taylor, M., Haggerty, J., Gresty, D. and Fergus, P., 2010. Forensic investigation of peer-to-peer networks. Network Security, 2010(9), pp.12-15.
Taylor, M., Haggerty, J., Gresty, D. and Hegarty, R., 2010. Digital evidence in cloud computing systems. Computer law & security review, 26(3), pp.304-308.