Name
Affiliation
Papers
PAVEL GLADYSHEV
Center for Cybercrime Investigation, University College Dublin, Belfield, Dublin, 4 Ireland
38
Collaborators
Citations 
PageRank 
28
194
24.85
Referers 
Referees 
References 
250
277
157
Search Limit
100277
Title
Citations
PageRank
Year
Consistent pathway analysis: a structured analytic method00.342019
Simulation Direct Current Machine with Wireless Rotor00.342019
Cybercrime as a Consequence of Unreasonable Expectations00.342019
Synchronous motor with salient poles rotor and all coils placed on the stator00.342017
Decision-theoretic file carving.20.402017
A survey of mutual legal assistance involving digital evidence.30.652016
A Survey of International Cooperation in Digital Investigations00.342015
Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE.00.342015
Forensic analysis of instagram and path on an iPhone 5s mobile device.10.412015
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence.20.372015
The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices00.342015
Reverse engineering a CCTV system, a case study10.482014
Automated inference of past action instances in digital investigations50.662014
An Automated Link Analysis Solution Applied to Digital Forensic Investigations.00.342013
Signature Based Detection of User Events for Post-Mortem Forensic Analysis30.432013
The internet of things00.342013
Challenges with Automation in Digital Forensic Investigations80.642013
Digital Forensic Reconstruction of a Program Action00.342013
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview81.042013
BREDOLAB: Shopping in the Cybercrime Underworld.40.442012
Evasion-resistant malware signature based on profiling kernel data structure objects00.342012
Towards automated forensic event reconstruction of malicious code (poster abstract)30.442012
Investigating File Encrypted Material Using NTFS $logfile.00.342012
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes.10.352012
A Novel Methodology for Malware Intrusion Attack Path Reconstruction.10.352011
Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire00.342010
Cryptopometry As A Methodology For Investigating Encrypted Material40.572010
A Consistency Study of the Windows Registry30.432010
Temporal Analysis of Windows MRU Registry Keys20.422009
Investigating Encrypted Material00.342009
Using shellbag information to reconstruct user activities71.122009
A comparative methodology for the reconstruction of digital events using windows restore points71.672009
Analysis of Evidence Using Formal Event Reconstruction120.792009
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method60.502007
Formalising Event Time Bounding in Digital Investigations221.552005
Finite State Machine Analysis of a Blackmail Investigation291.462005
Finite state machine approach to digital event reconstruction574.422004
Cracking Rc5 With Java Applets30.531998