David Gresty

451 total citations
26 papers, 279 citations indexed

About

David Gresty is a scholar working on Information Systems, Signal Processing and Artificial Intelligence. According to data from OpenAlex, David Gresty has authored 26 papers receiving a total of 279 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Information Systems, 11 papers in Signal Processing and 6 papers in Artificial Intelligence. Recurrent topics in David Gresty's work include Digital and Cyber Forensics (17 papers), Advanced Malware Detection Techniques (11 papers) and Cybercrime and Law Enforcement Studies (8 papers). David Gresty is often cited by papers focused on Digital and Cyber Forensics (17 papers), Advanced Malware Detection Techniques (11 papers) and Cybercrime and Law Enforcement Studies (8 papers). David Gresty collaborates with scholars based in United Kingdom. David Gresty's co-authors include Mark Taylor, J. S. Haggerty, David Lamb, Robert Hegarty, Peter R. Almond, Diane Gan, Qi Shi, M. Merabti, David England and George Loukas and has published in prestigious journals such as Information and Software Technology, Internet Research and Systems Research and Behavioral Science.

In The Last Decade

David Gresty

25 papers receiving 236 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
David Gresty United Kingdom 7 224 144 59 42 41 26 279
Francois Mouton South Africa 9 303 1.4× 164 1.1× 39 0.7× 12 0.3× 79 1.9× 19 367
Yudi Prayudi Indonesia 13 425 1.9× 235 1.6× 146 2.5× 75 1.8× 20 0.5× 108 541
Louise Leenen South Africa 8 214 1.0× 119 0.8× 52 0.9× 10 0.2× 47 1.1× 42 307
Chaiyong Ragkhitwetsagul Thailand 12 413 1.8× 164 1.1× 94 1.6× 9 0.2× 16 0.4× 37 470
Doowon Kim United States 9 350 1.6× 260 1.8× 148 2.5× 10 0.2× 98 2.4× 33 470
Keyun Ruan Ireland 5 193 0.9× 130 0.9× 32 0.5× 30 0.7× 11 0.3× 7 216
Iman Kamehkhosh Germany 8 210 0.9× 97 0.7× 95 1.6× 93 2.2× 43 1.0× 9 297
Mohammadreza Ebrahimi United States 10 159 0.7× 118 0.8× 134 2.3× 17 0.4× 54 1.3× 22 307
Gastón L’Huillier Chile 9 142 0.6× 38 0.3× 138 2.3× 12 0.3× 40 1.0× 17 262
Hassan I. Abdalla United Arab Emirates 9 116 0.5× 42 0.3× 117 2.0× 44 1.0× 23 0.6× 26 264

Countries citing papers authored by David Gresty

Since Specialization
Citations

This map shows the geographic impact of David Gresty's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by David Gresty with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites David Gresty more than expected).

Fields of papers citing papers by David Gresty

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by David Gresty. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by David Gresty. The network helps show where David Gresty may publish in the future.

Co-authorship network of co-authors of David Gresty

This figure shows the co-authorship network connecting the top 25 collaborators of David Gresty. A scholar is included among the top collaborators of David Gresty based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with David Gresty. David Gresty is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Gresty, David, et al.. (2023). Forensic Implication of a Cyber-Enabled Fraud Taking Advantage of an Offline Adversary-in-the-Middle (AiTM) Attack. Greenwich Academic Literature Archive (University of Greenwich). 1258–1263. 1 indexed citations
2.
Gresty, David, et al.. (2021). Have You Been Framed and Can You Prove It?. Greenwich Academic Literature Archive (University of Greenwich). 1236–1241. 2 indexed citations
3.
Gresty, David, et al.. (2017). Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records. Greenwich Academic Literature Archive (University of Greenwich). 37. 365–372.
4.
Gan, Diane, David Chadwick, David Gresty, Tuan Vuong, & Edward H Phillips. (2017). Experiential and Simulated Learning: An Interdisciplinary Approach. 1183–1186. 1 indexed citations
5.
Gresty, David, et al.. (2016). Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history. Digital Investigation. 16. S124–S133. 6 indexed citations
6.
Taylor, Mark, et al.. (2016). Avoiding the misuse of social media by employees. Network Security. 2016(5). 8–11. 6 indexed citations
7.
Taylor, Mark, et al.. (2015). Investigating employee harassment via social media. Journal of Systems and Information Technology. 17(4). 322–335. 6 indexed citations
8.
Taylor, Mark, et al.. (2014). Forensic investigation of social networking applications. Network Security. 2014(11). 9–16. 22 indexed citations
9.
Taylor, Mark, et al.. (2012). Digital evidence from mobile telephone applications. Computer law & security review. 28(3). 335–339. 6 indexed citations
10.
Taylor, Mark, J. S. Haggerty, David Gresty, & David Lamb. (2011). Forensic investigation of cloud computing systems. Network Security. 2011(3). 4–10. 80 indexed citations
11.
Taylor, Mark, J. S. Haggerty, David Gresty, & Paul Fergus. (2010). Forensic investigation of peer-to-peer networks. Network Security. 2010(9). 12–15. 6 indexed citations
12.
Taylor, Mark, J. S. Haggerty, & David Gresty. (2010). The legal aspects of corporate computer usage policies. University of Salford Institutional Repository (University of Salford). 26(1). 72–76. 6 indexed citations
13.
Taylor, Mark, et al.. (2009). Teaching information technology law. Journal of Further and Higher Education. 33(4). 473–481. 1 indexed citations
14.
Haggerty, J. S., Mark Taylor, & David Gresty. (2008). Determining Culpability in Investigations of Malicious E-mail Dissemination within the Organisation. 12–20. 6 indexed citations
15.
Taylor, Mark, et al.. (2006). Computer game-flow design. Computers in entertainment. 4(1). 5–5. 20 indexed citations
16.
Gresty, David, Qi Shi, & M. Merabti. (2005). Requirements for a general framework for response to distributed denial-of-service. 422–429. 9 indexed citations
17.
Taylor, Mark, et al.. (2005). Cyber law: case studies in the SME environment. Systems Research and Behavioral Science. 22(3). 261–267. 3 indexed citations
18.
Taylor, Mark, et al.. (2004). The law and the systems analyst. Systems Research and Behavioral Science. 21(1). 97–100. 2 indexed citations
19.
Taylor, Mark, et al.. (2004). Teaching Business IT Ethics. Active Learning in Higher Education. 5(1). 43–55. 1 indexed citations
20.
Taylor, M. J., et al.. (2001). Knowledge for network support. Information and Software Technology. 43(8). 469–475. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026