default search action
Pavel Gladyshev
Person information
- affiliation: University College Dublin, Ireland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Francis Kofi Andoh-Baidoo, Martin Otu Offei, Emmanuel W. Ayaburi, Mikko T. Siponen, Pavel Gladyshev:
How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates. IEEE Secur. Priv. 22(4): 124-128 (2024) - 2023
- [e5]Sanjay Goel, Pavel Gladyshev, Akatyev Nikolay, George Markowsky, Daryl Johnson:
Digital Forensics and Cyber Crime - 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 508, Springer 2023, ISBN 978-3-031-36573-7 [contents] - 2022
- [j19]Veronica Schmitt, Pavel Gladyshev, Joshua James:
Medical Device Forensics. IEEE Secur. Priv. 20(1): 96-100 (2022) - [c25]Francis N. Nwebonyi, Xiaoyu Du, Pavel Gladyshev:
Crime and Incident Watch for Smart Cities: A Sensor-Based Approach. ICDF2C 2022: 222-238 - [c24]Xiaoyu Du, Francis N. Nwebonyi, Pavel Gladyshev:
Automating the Flow of Data Between Digital Forensic Tools Using Apache NiFi. ICDF2C 2022: 435-452 - [e4]Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson:
Digital Forensics and Cyber Crime - 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 441, Springer 2022, ISBN 978-3-031-06364-0 [contents] - 2021
- [c23]Mohammed A. Alsuwaie, Babak Habibnia, Pavel Gladyshev:
Data Leakage Prevention Adoption Model & DLP Maturity Level Assessment. ISCSIC 2021: 396-405 - [e3]Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, Suryadipta Majumdar:
Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 351, Springer 2021, ISBN 978-3-030-68733-5 [contents] - 2020
- [j18]Kingson Chinedu Odogwu, Pavel Gladyshev, Babak Habibnia:
PNG Data Detector for DECA. Digit. Investig. 32 Supplement: 300910 (2020) - [c22]Tom Van der Mussele, Babak Habibnia, Pavel Gladyshev:
Remote Air-Gap Live Forensics. ICDF2C 2020: 182-203
2010 – 2019
- 2019
- [j17]Lee Tobin, Pavel Gladyshev:
Consistent pathway analysis: a structured analytic method. Artif. Intell. Law 27(1): 1-14 (2019) - [j16]Pavel Gladyshev:
Cybercrime as a Consequence of Unreasonable Expectations. IEEE Secur. Priv. 17(4): 84-87 (2019) - 2017
- [j15]Pavel Gladyshev, Joshua I. James:
Decision-theoretic file carving. Digit. Investig. 22: 46-61 (2017) - [c21]Baolei Liu, Abraham G. Campbell, Pavel Gladyshev:
Development of a cybercrime investigation simulator for immersive virtual reality. VSMM 2017: 1-4 - 2016
- [j14]Joshua I. James, Pavel Gladyshev:
A survey of mutual legal assistance involving digital evidence. Digit. Investig. 18: 23-32 (2016) - 2015
- [j13]Joshua I. James, Pavel Gladyshev:
Automated inference of past action instances in digital investigations. Int. J. Inf. Sec. 14(3): 249-261 (2015) - [j12]Lee Tobin, Pavel Gladyshev:
Open Forensic Devices. J. Digit. Forensics Secur. Law 10(4): 97-104 (2015) - [c20]Alleyn Conway, Joshua I. James, Pavel Gladyshev:
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence. ICDF2C 2015: 16-26 - [c19]Joshua I. James, Pavel Gladyshev:
A Survey of International Cooperation in Digital Investigations. ICDF2C 2015: 103-114 - [c18]Reema Al Mushcab, Pavel Gladyshev:
The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices. InfoSec 2015: 66-71 - [c17]Reema Al Mushcab, Pavel Gladyshev:
Forensic analysis of instagram and path on an iPhone 5s mobile device. ISCC 2015: 146-151 - [i7]Joshua I. James, Alejandra Lopez-Fernandez, Pavel Gladyshev:
Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations. CoRR abs/1502.05186 (2015) - [i6]Joshua I. James, Ahmed F. Shosha, Pavel Gladyshev:
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE. CoRR abs/1502.05191 (2015) - 2014
- [j11]Bradley L. Schatz, Pavel Gladyshev, Ronald M. van der Knijff:
The internet of things: Interconnected digital dust. Digit. Investig. 11(3): 141-142 (2014) - [j10]Lee Tobin, Ahmed F. Shosha, Pavel Gladyshev:
Reverse engineering a CCTV system, a case study. Digit. Investig. 11(3): 179-186 (2014) - [e2]Pavel Gladyshev, Andrew Marrington, Ibrahim M. Baggili:
Digital Forensics and Cyber Crime - Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 132, Springer 2014, ISBN 978-3-319-14288-3 [contents] - [i5]Joshua I. James, Pavel Gladyshev:
Automated Inference of Past Action Instances in Digital Investigations. CoRR abs/1407.5714 (2014) - [i4]Glenn S. Dardick, Barbara Endicott-Popovsky, Pavel Gladyshev, Thomas Kemmerich, Carsten Rudolph:
Digital Evidence and Forensic Readiness (Dagstuhl Seminar 14092). Dagstuhl Reports 4(2): 150-190 (2014) - 2013
- [j9]Joshua I. James, Pavel Gladyshev:
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview. Digit. Investig. 10(2): 148-157 (2013) - [c16]Joshua I. James, Alejandra Lopez-Fernandez, Pavel Gladyshev:
Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations. ICDF2C 2013: 147-169 - [c15]Fergal Brennan, Martins Udris, Pavel Gladyshev:
An Automated Link Analysis Solution Applied to Digital Forensic Investigations. ICDF2C 2013: 189-206 - [c14]Joshua I. James, Ahmed F. Shosha, Pavel Gladyshev:
Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE. ICDF2C 2013: 223-236 - [c13]Ahmed F. Shosha, Lee Tobin, Pavel Gladyshev:
Digital Forensic Reconstruction of a Program Action. IEEE Symposium on Security and Privacy Workshops 2013: 119-122 - [i3]Joshua James, Pavel Gladyshev, Mohd Taufik Abdullah, Yuandong Zhu:
Analysis of Evidence Using Formal Event Reconstruction. CoRR abs/1302.2308 (2013) - [i2]Joshua James, Pavel Gladyshev, Yuandong Zhu:
Signature Based Detection of User Events for Post-Mortem Forensic Analysis. CoRR abs/1302.2395 (2013) - [i1]Joshua James, Pavel Gladyshev:
Challenges with Automation in Digital Forensic Investigations. CoRR abs/1303.4498 (2013) - 2012
- [c12]Ahmed F. Shosha, Chen-Ching Liu, Pavel Gladyshev, Marcus Matten:
Evasion-resistant malware signature based on profiling kernel data structure objects. CRiSIS 2012: 1-8 - [c11]Ahmed F. Shosha, Joshua I. James, Alan Hannaway, Chen-Ching Liu, Pavel Gladyshev:
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes. ICDF2C 2012: 66-80 - [c10]Niall McGrath, Pavel Gladyshev:
Investigating File Encrypted Material Using NTFS $logfile. ICDF2C 2012: 183-203 - [c9]Daan de Graaf, Ahmed F. Shosha, Pavel Gladyshev:
BREDOLAB: Shopping in the Cybercrime Underworld. ICDF2C 2012: 302-313 - [c8]Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev:
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract). RAID 2012: 388-389 - [e1]Pavel Gladyshev, Marcus K. Rogers:
Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 88, Springer 2012, ISBN 978-3-642-35514-1 [contents] - 2011
- [c7]Ahmed F. Shosha, Joshua James, Pavel Gladyshev:
A Novel Methodology for Malware Intrusion Attack Path Reconstruction. ICDF2C 2011: 131-140 - 2010
- [j8]Niall McGrath, Pavel Gladyshev, Joe Carthy:
Cryptopometry as a Methodology for Investigating Encrypted Material. Int. J. Digit. Crime Forensics 2(1): 1-20 (2010) - [c6]Pavel Gladyshev, Afrah Almansoori:
Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire. ICDF2C 2010: 55-64 - [c5]Joshua James, Pavel Gladyshev, Yuandong Zhu:
Signature Based Detection of User Events for Post-mortem Forensic Analysis. ICDF2C 2010: 96-109 - [c4]Yuandong Zhu, Joshua James, Pavel Gladyshev:
A Consistency Study of the Windows Registry. IFIP Int. Conf. Digital Forensics 2010: 77-90
2000 – 2009
- 2009
- [j7]Yuandong Zhu, Joshua James, Pavel Gladyshev:
A comparative methodology for the reconstruction of digital events using windows restore points. Digit. Investig. 6(1-2): 8-15 (2009) - [j6]Yuandong Zhu, Pavel Gladyshev, Joshua James:
Using shellbag information to reconstruct user activities. Digit. Investig. 6(Supplement): S69-S77 (2009) - [c3]Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy:
Investigating Encrypted Material. e-Forensics 2009: 29-35 - [c2]Joshua James, Pavel Gladyshev, Mohd Taufik Abdullah, Yuandong Zhu:
Analysis of Evidence Using Formal Event Reconstruction. ICDF2C 2009: 85-98 - [c1]Yuandong Zhu, Pavel Gladyshev, Joshua James:
Temporal Analysis of Windows MRU Registry Keys. IFIP Int. Conf. Digital Forensics 2009: 83-93 - 2007
- [j5]Pavel Gladyshev, Andreas Enbacka:
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method. Int. J. Digit. EVid. 6(2) (2007) - 2005
- [j4]Pavel Gladyshev:
Finite State Machine Analysis of a Blackmail Investigation. Int. J. Digit. EVid. 4(1) (2005) - [j3]Pavel Gladyshev, Ahmed Patel:
Formalising Event Time Bounding in Digital Investigations. Int. J. Digit. EVid. 4(2) (2005) - 2004
- [j2]Pavel Gladyshev, Ahmed Patel:
Finite state machine approach to digital event reconstruction. Digit. Investig. 1(2): 130-149 (2004)
1990 – 1999
- 1998
- [j1]Pavel Gladyshev, Ahmed Patel, Donal O'Mahony:
Cracking RC5 with Java applets. Concurr. Pract. Exp. 10(11-13): 1165-1171 (1998)
Coauthor Index
aka: Joshua I. James
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint