Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Clayton D. Scott
muljowidodo kartidjo
Duzgun, H.Sebnem
Zhengxing Sun
Jean Jourdan
Fernando Henrique Lermen
Roland Zumkeller
Maximilian Dürr
Dan Graur
Fuhui Guo
Home
/
Author
/
PAVEL GLADYSHEV
Author Info
Open Visualization
Name
Affiliation
Papers
PAVEL GLADYSHEV
Center for Cybercrime Investigation, University College Dublin, Belfield, Dublin, 4 Ireland
38
Collaborators
Citations
PageRank
28
194
24.85
Referers
Referees
References
250
277
157
Search Limit
100
277
Publications (38 rows)
Collaborators (28 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Consistent pathway analysis: a structured analytic method
0
0.34
2019
Simulation Direct Current Machine with Wireless Rotor
0
0.34
2019
Cybercrime as a Consequence of Unreasonable Expectations
0
0.34
2019
Synchronous motor with salient poles rotor and all coils placed on the stator
0
0.34
2017
Decision-theoretic file carving.
2
0.40
2017
A survey of mutual legal assistance involving digital evidence.
3
0.65
2016
A Survey of International Cooperation in Digital Investigations
0
0.34
2015
Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE.
0
0.34
2015
Forensic analysis of instagram and path on an iPhone 5s mobile device.
1
0.41
2015
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence.
2
0.37
2015
The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices
0
0.34
2015
Reverse engineering a CCTV system, a case study
1
0.48
2014
Automated inference of past action instances in digital investigations
5
0.66
2014
An Automated Link Analysis Solution Applied to Digital Forensic Investigations.
0
0.34
2013
Signature Based Detection of User Events for Post-Mortem Forensic Analysis
3
0.43
2013
The internet of things
0
0.34
2013
Challenges with Automation in Digital Forensic Investigations
8
0.64
2013
Digital Forensic Reconstruction of a Program Action
0
0.34
2013
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview
8
1.04
2013
BREDOLAB: Shopping in the Cybercrime Underworld.
4
0.44
2012
Evasion-resistant malware signature based on profiling kernel data structure objects
0
0.34
2012
Towards automated forensic event reconstruction of malicious code (poster abstract)
3
0.44
2012
Investigating File Encrypted Material Using NTFS $logfile.
0
0.34
2012
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes.
1
0.35
2012
A Novel Methodology for Malware Intrusion Attack Path Reconstruction.
1
0.35
2011
Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire
0
0.34
2010
Cryptopometry As A Methodology For Investigating Encrypted Material
4
0.57
2010
A Consistency Study of the Windows Registry
3
0.43
2010
Temporal Analysis of Windows MRU Registry Keys
2
0.42
2009
Investigating Encrypted Material
0
0.34
2009
Using shellbag information to reconstruct user activities
7
1.12
2009
A comparative methodology for the reconstruction of digital events using windows restore points
7
1.67
2009
Analysis of Evidence Using Formal Event Reconstruction
12
0.79
2009
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
6
0.50
2007
Formalising Event Time Bounding in Digital Investigations
22
1.55
2005
Finite State Machine Analysis of a Blackmail Investigation
29
1.46
2005
Finite state machine approach to digital event reconstruction
57
4.42
2004
Cracking Rc5 With Java Applets
3
0.53
1998
1