Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tom Berry is active.

Publication


Featured researches published by Tom Berry.


global communications conference | 2004

DiDDeM: a system for early detection of TCP SYN flood attacks

John Haggerty; Tom Berry; Qi Shi; Madjid Merabti

This paper presents the distributed denial-of-service detection mechanism (DiDDeM) system for early detection of denial-of-service attacks. The design requirements of the system are posited to demonstrate the requirements for an early detection system. An overview of the system is presented to show how these requirements are met. DiDDeM provides a two-tier detection approach. First, pre-filters (PFs) filter traffic for possible attacks. This is achieved through the application of both stateful and stateless signatures utilising routing congestion algorithms. Second, command and control (C/sup 2/) servers provide intra- and inter-domain co-operation and response to contain an attack within the routing infrastructure. The results for stateful and stateless signature detection of TCP SYN flood attacks are presented.


Network Security archive | 2014

Forensic investigation of social networking applications

Mark John Taylor; John Haggerty; David Gresty; Peter Almond; Tom Berry

Social networking applications such as Facebook, LinkedIn, MySpace and Twitter provide facilities including email, blogging, instant messaging and photo sharing for social and commercial exchange.1 There has been a rapid growth in the use of social networking applications by both individuals and organisations.2,3 And an increasing number of organisations use Facebook and Twitter as part of their marketing campaigns.4,5Social networking applications such as Facebook, Twitter and LinkedIn may be involved in instances of misuse that can affect both organisations and individuals.Dr Mark Taylor, Dr John Haggerty, David Gresty, Peter Almond and Dr Tom Berry of Liverpool John Moores University, Nottingham Trent University and University of Greenwich examine the forensic process of obtaining digital evidence from social networking applications and the legal aspects involved in potential misuse.


Network Security archive | 2016

Avoiding the misuse of social media by employees

Mark John Taylor; John Haggerty; David Gresty; Chris Wren; Tom Berry

Social networking applications such as Facebook, Twitter and YouTube are increasingly being used in various ways by organisations. Organisations may adopt the use of social media for a variety of reasons including engaging with customers and clients, and supporting communication between employees.1-3 Although social media can potentially support communication between employees, care needs to be taken that they are used in a manner appropriate for relevant business purposes, at all times.Social networking applications are increasingly being used by organisations to engage with customers and support communications between employees.However, care needs to be taken that social media are used in a manner appropriate to relevant business purposes. This articles examines the potential misuse of social media by employees, the UK legislation relevant to such misuse, and also explores approaches by which organisations can attempt to limit such misuse.


Journal of Systems and Information Technology | 2015

Investigating employee harassment via social media

Mark John Taylor; John Haggerty; David Gresty; Natalia Criado Pacheco; Tom Berry; Peter Almond

Purpose – The purpose of this paper is to examine the process of investigation of employee harassment via social media to develop best practices to help organisations conduct such investigations more effectively. Design/methodology/approach – It reviews the technical, managerial and legal literature to develop guidance for organisations conducting investigations of employee harassment via social media. Findings – Organisations may not have effective procedures for the investigation of social media misuse, in general, and employee harassment via social media, in particular. This paper provides guidance for organisations to conduct investigation of employee harassment via social media more effectively. Originality/value – The paper consolidates the fragmented discussion of investigation of social media misuse with regard to employee harassment via a literature review across technical, managerial and legal disciplines. The paper provides guidance to support organisations for conducting investigations of empl...


International Journal of Multimedia and Image Processing | 2011

Cloud Computing: Pros and Cons for Computer Forensic Investigations

Chris Wren; Tom Berry


prague stringology conference | 1999

A Fast String Matching Algorithm and Experimental Results.

Tom Berry; Somasundaram Ravindran


international conference for internet technology and secured transactions | 2010

Cloud computing: Forensic challenges for law enforcement

Chris Wren; Tom Berry


Computer Law & Security Review | 2011

Digital evidence from peer-to-peer networks

Mark John Taylor; John Haggerty; David Gresty; Tom Berry


international conference on developments in esystems engineering | 2010

Footprinting: A Methodology for Auditing eSystem Vulnerabilities

Chris Wren; Tom Berry


Kybernetika | 2002

TUNING THE ZHU-TAKAOKA STRING MATCHING ALGORITHM AND EXPERIMENTAL RESULTS

Tom Berry; Somasundaram Ravindran

Collaboration


Dive into the Tom Berry's collaboration.

Top Co-Authors

Avatar

John Haggerty

Nottingham Trent University

View shared research outputs
Top Co-Authors

Avatar

Chris Wren

Liverpool John Moores University

View shared research outputs
Top Co-Authors

Avatar

David Gresty

Liverpool John Moores University

View shared research outputs
Top Co-Authors

Avatar

Mark John Taylor

Liverpool John Moores University

View shared research outputs
Top Co-Authors

Avatar

Peter Almond

Liverpool John Moores University

View shared research outputs
Top Co-Authors

Avatar

Madjid Merabti

Liverpool John Moores University

View shared research outputs
Top Co-Authors

Avatar

Natalia Criado Pacheco

Liverpool John Moores University

View shared research outputs
Top Co-Authors

Avatar

Qi Shi

Liverpool John Moores University

View shared research outputs
Researchain Logo
Decentralizing Knowledge