Journal article
Akinbi A, Berry T. 2020. Forensic Investigation of Google Assistant SN Computer Science, 1 DOI Publisher Url Public Url
Taylor MJ, Haggerty J, Gresty D, Wren C, Berry T. 2016. Avoiding the misuse of social media by employees Network Security, 2016 :8-11 DOI Publisher Url Public Url
Taylor MJ, Haggerty J, Gresty D, Criado N, Almond P, Berry T. 2015. Investigating employee harassment via social media Journal of Systems and Information Technology, 17 :322-335 DOI Publisher Url Public Url
Taylor MJ, Haggerty J, Gresty D, Almond P, Berry T. 2014. Forensic investigation of social networking applications Network Security, :9-16 DOI Publisher Url Public Url
Taylor M, Haggerty J, Gresty D, Berry T. 2011. Digital evidence from peer-to-peer networks COMPUTER LAW & SECURITY REVIEW, 27 :647-652 DOI Author Url Publisher Url
Berry T, Ravindran S. 2002. Tuning the Zhu-Takaoka string matching algorithm and experimental results KYBERNETIKA, 38 :67-80 Author Url
Conference publication
Reilly D, Wren C, Berry T. 2010. Cloud computing: Forensic challenges for law enforcement 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010,
Wren C, Reilly D, Berry T. 2010. Footprinting: A methodology for auditing eSystem vulnerabilities Proceedings - 3rd International Conference on Developments in eSystems Engineering, DeSE 2010, :263-267 DOI Publisher Url
Haggerty J, Berry T, Shi Q, Merabti M. 2004. DiDDeM: A system for early detection of TCP SYN flood attacks GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, IEEE Global Telecommunications Conference (GLOBECOM 04) :2037-2042 DOI Author Url Publisher Url