Pavel Gladyshev

Orcid: 0000-0002-7449-4475

Affiliations:
  • University College Dublin, Ireland


According to our database1, Pavel Gladyshev authored at least 47 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates.
IEEE Secur. Priv., 2024

2022
Medical Device Forensics.
IEEE Secur. Priv., 2022

Crime and Incident Watch for Smart Cities: A Sensor-Based Approach.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

Automating the Flow of Data Between Digital Forensic Tools Using Apache NiFi.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

2021
Data Leakage Prevention Adoption Model & DLP Maturity Level Assessment.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021

2020
PNG Data Detector for DECA.
Digit. Investig., 2020

Remote Air-Gap Live Forensics.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

2019
Cybercrime as a Consequence of Unreasonable Expectations.
IEEE Secur. Priv., 2019

Consistent pathway analysis: a structured analytic method.
Artif. Intell. Law, 2019

2017
Decision-theoretic file carving.
Digit. Investig., 2017

Development of a cybercrime investigation simulator for immersive virtual reality.
Proceedings of the 23rd International Conference on Virtual System & Multimedia, 2017

2016
A survey of mutual legal assistance involving digital evidence.
Digit. Investig., 2016

2015
Open Forensic Devices.
J. Digit. Forensics Secur. Law, 2015

Automated inference of past action instances in digital investigations.
Int. J. Inf. Sec., 2015

Forensic analysis of instagram and path on an iPhone 5s mobile device.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

A Survey of International Cooperation in Digital Investigations.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

2014
Reverse engineering a CCTV system, a case study.
Digit. Investig., 2014

The internet of things: Interconnected digital dust.
Digit. Investig., 2014

Digital Evidence and Forensic Readiness (Dagstuhl Seminar 14092).
Dagstuhl Reports, 2014

2013
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview.
Digit. Investig., 2013

Challenges with Automation in Digital Forensic Investigations
CoRR, 2013

Digital Forensic Reconstruction of a Program Action.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

An Automated Link Analysis Solution Applied to Digital Forensic Investigations.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

2012
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

Investigating File Encrypted Material Using NTFS $logfile.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

BREDOLAB: Shopping in the Cybercrime Underworld.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

Evasion-resistant malware signature based on profiling kernel data structure objects.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
A Novel Methodology for Malware Intrusion Attack Path Reconstruction.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

2010
Cryptopometry as a Methodology for Investigating Encrypted Material.
Int. J. Digit. Crime Forensics, 2010

A Consistency Study of the Windows Registry.
Proceedings of the Advances in Digital Forensics VI, 2010

Signature Based Detection of User Events for Post-mortem Forensic Analysis.
Proceedings of the Digital Forensics and Cyber Crime, 2010

Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire.
Proceedings of the Digital Forensics and Cyber Crime, 2010

2009
A comparative methodology for the reconstruction of digital events using windows restore points.
Digit. Investig., 2009

Using shellbag information to reconstruct user activities.
Digit. Investig., 2009

Temporal Analysis of Windows MRU Registry Keys.
Proceedings of the Advances in Digital Forensics V, 2009

Analysis of Evidence Using Formal Event Reconstruction.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

Investigating Encrypted Material.
Proceedings of the Forensics in Telecommunications, 2009

2007
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method.
Int. J. Digit. EVid., 2007

2005
Formalising Event Time Bounding in Digital Investigations.
Int. J. Digit. EVid., 2005

Finite State Machine Analysis of a Blackmail Investigation.
Int. J. Digit. EVid., 2005

2004
Finite state machine approach to digital event reconstruction.
Digit. Investig., 2004

1998
Cracking RC5 with Java applets.
Concurr. Pract. Exp., 1998


  Loading...