Image of Dr Thomas Berry

Dr Thomas Berry

School of Computer Science and Mathematics

Faculty of Engineering and Technology

Email: T.Berry@ljmu.ac.uk

Telephone: 0151 231 2080

Dr Tom Berry is a principal lecturer in the Department of Computer Science and is the programme leader for Computer Forensics and Computer Security.

His research interests are in the forensic analysis of digital devices.

He is a Fellow of the Higher Education Academy.

Degrees

2005, Liverpool John Moores University, United Kingdom, PgCert in Learning and Teaching in Higher Education
2002, Liverpool John Moores University, United Kingdom, PhD in Computer Science
1997, University of Liverpool, United Kingdom, BSc (Hons) in Mathematics and Computer Science

Certifications

2015, MSAB (www.msab.com), Sweden, XRY Certification (Train the Trainer)
2010, Accessdata, United States, ACE (Accessdata Certified Examiner)

Journal article

Akinbi A, Berry T. 2020. Forensic Investigation of Google Assistant SN Computer Science, 1 DOI Publisher Url Public Url

Taylor MJ, Haggerty J, Gresty D, Wren C, Berry T. 2016. Avoiding the misuse of social media by employees Network Security, 2016 :8-11 DOI Publisher Url Public Url

Taylor MJ, Haggerty J, Gresty D, Criado N, Almond P, Berry T. 2015. Investigating employee harassment via social media Journal of Systems and Information Technology, 17 :322-335 DOI Publisher Url Public Url

Taylor MJ, Haggerty J, Gresty D, Almond P, Berry T. 2014. Forensic investigation of social networking applications Network Security, :9-16 DOI Publisher Url Public Url

Taylor M, Haggerty J, Gresty D, Berry T. 2011. Digital evidence from peer-to-peer networks COMPUTER LAW & SECURITY REVIEW, 27 :647-652 DOI Author Url Publisher Url

Berry T, Ravindran S. 2002. Tuning the Zhu-Takaoka string matching algorithm and experimental results KYBERNETIKA, 38 :67-80 Author Url

Conference publication

Reilly D, Wren C, Berry T. 2010. Cloud computing: Forensic challenges for law enforcement 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010,

Wren C, Reilly D, Berry T. 2010. Footprinting: A methodology for auditing eSystem vulnerabilities Proceedings - 3rd International Conference on Developments in eSystems Engineering, DeSE 2010, :263-267 DOI Publisher Url

Haggerty J, Berry T, Shi Q, Merabti M. 2004. DiDDeM: A system for early detection of TCP SYN flood attacks GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, IEEE Global Telecommunications Conference (GLOBECOM 04) :2037-2042 DOI Author Url Publisher Url

Top