default search action
Jevgenijus Toldinas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j8]Agnius Liutkevicius, Nerijus Morkevicius, Algimantas Venckauskas, Jevgenijus Toldinas:
Distributed Agent-Based Orchestrator Model for Fog Computing. Sensors 22(15): 5894 (2022) - 2021
- [j7]Sarunas Grigaliunas, Jevgenijus Toldinas, Algimantas Venckauskas, Nerijus Morkevicius, Robertas Damasevicius:
Digital Evidence Object Model for Situation Awareness and Decision Making in Digital Forensics Investigation. IEEE Intell. Syst. 36(5): 39-48 (2021) - 2020
- [j6]Sarunas Grigaliunas, Jevgenijus Toldinas:
Habits Attribution and Digital Evidence Object Models Based Tool for Cybercrime Investigation. Balt. J. Mod. Comput. 8(2) (2020) - 2019
- [j5]Algimantas Venckauskas, Nerijus Morkevicius, Vaidas Jukavicius, Robertas Damasevicius, Jevgenijus Toldinas, Sarunas Grigaliunas:
An Edge-Fog Secure Self-Authenticable Data Transfer Protocol. Sensors 19(16): 3612 (2019) - 2017
- [j4]Algimantas Venckauskas, Vacius Jusas, Kestutis Paulikas, Jevgenijus Toldinas:
Methodology to investigate BitTorrent sync protocol. Comput. Sci. Inf. Syst. 14(1): 197-218 (2017) - 2016
- [j3]Algimantas Venckauskas, Vacius Jusas, Kestutis Paulikas, Jevgenijus Toldinas:
A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client. Symmetry 8(6): 40 (2016) - [j2]Algimantas Venckauskas, Vytautas Stuikys, Jevgenijus Toldinas, Nerijus Jusas:
A Model-Driven Framework to Develop Personalized Health Monitoring. Symmetry 8(7): 65 (2016) - 2015
- [j1]Algimantas Venckauskas, Vacius Jusas, Kestutis Paulikas, Jevgenijus Toldinas:
Investigation of Artifacts Left by BitTorrent Client on the Local Computer Operating under Windows 8.1. Inf. Technol. Control. 44(4): 451-461 (2015)
Conference and Workshop Papers
- 2022
- [c5]Lukas Jokubauskas, Jevgenijus Toldinas, Borisas Lozinskis:
Detecting applications vulnerabilities using remote procedure calls. IVUS 2022: 58-65 - 2019
- [c4]Robertas Damasevicius, Jevgenijus Toldinas, Algimantas Venckauskas, Sarunas Grigaliunas, Nerijus Morkevicius, Vaidas Jukavicius:
Visual Analytics for Cyber Security Domain: State-of-the-Art and Challenges. ICIST 2019: 256-270 - [c3]Edgaras Baranauskas, Jevgenijus Toldinas, Borisas Lozinskis:
Evaluation of the impact on energy consumption of MQTT protocol over TLS. IVUS 2019: 56-60 - 2014
- [c2]Algimantas Venckauskas, Nerijus Jusas, Jevgenijus Toldinas, Egidijus Kazanavicius:
Security Level versus Energy Consumption in Wireless Protocols for Internet of Things. ICIST 2014: 419-429 - 2008
- [c1]Robertas Damasevicius, Vytautas Stuikys, Jevgenijus Toldinas:
Domain Ontology-Based Generative Component Design Using Feature Diagrams and Meta-programming Techniques. ECSA 2008: 338-341
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint