David Gresty BSc, MSc, PhD

Senior Lecturer

Responsibilities within the university

Undergraduate and Postgraduate Project Supervision for Forensics and Cyber Security

Course leader 2019/20

Computer Forensics 2

Teaching and Lab support (From 2014)

Computer Forensics 2

Computer Forensics 3

Cyber Crime and Forensics

Information Security

Research / Scholarly interests

Forensics in the IoT crime scene

Confidence in digital forensics expert evidence

Internet History and Pattern of Life Analysis

Recent publications

Gan, D., Chadwick, D., Gresty, D., Vuong, T. and Phillips, E., 2017, December. Experiential and Simulated Learning: An Interdisciplinary Approach. In 2017 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 1183-1186). IEEE.

Gresty, D.W., Loukas, G., Gan, D. and Ierotheou, C., 2017, June. Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 365-372). IEEE.

Taylor, M., Haggerty, J., Gresty, D., Wren, C. and Berry, T., 2016. Avoiding the misuse of social media by employees. Network Security2016(5), pp.8-11.

Gresty, D.W., Gan, D., Loukas, G. and Ierotheou, C., 2016. Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history. Digital Investigation16, pp.S124-S133.

Taylor, M., Haggerty, J., Gresty, D., Criado Pacheco, N., Berry, T. and Almond, P., 2015. Investigating employee harassment via social media. Journal of Systems and Information Technology17(4), pp.322-335.

Taylor, M., Haggerty, J., Gresty, D., Almond, P. and Berry, T., 2014. Forensic investigation of social networking applications. Network Security2014(11), pp.9-16.

Gresty, D.W., Gan, D. and Loukas, G., Digital Forensic Analysis of Internet History Using Principal Component Analysis. 15th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 237-242, Liverpool, UK (June 23–24 2014)​

Taylor, M., Hughes, G., Haggerty, J., Gresty, D. and Almond, P., 2012. Digital evidence from mobile telephone applications. Computer Law & Security Review28(3), pp.335-339.

Taylor, M., Haggerty, J., Gresty, D. and Berry, T., 2011. Digital evidence from peer-to-peer networks. Computer Law & Security Review27(6), pp.647-652.

Taylor, M., Haggerty, J., Gresty, D. and Lamb, D., 2011. Forensic investigation of cloud computing systems. Network Security2011(3), pp.4-10.

Taylor, M., Haggerty, J., Gresty, D. and Fergus, P., 2010. Forensic investigation of peer-to-peer networks. Network Security2010(9), pp.12-15.

Taylor, M., Haggerty, J., Gresty, D. and Hegarty, R., 2010. Digital evidence in cloud computing systems. Computer law & security review26(3), pp.304-308.​