default search action
Oliver Popov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Elias Seid, Oliver Popov, Fredrik Blix:
Security Attack Behavioural Pattern Analysis for Critical Service Providers. J. Cybersecur. Priv. 4(1): 55-75 (2024) - [j7]Jesper Bergman, Oliver Popov:
Recognition of tor malware and onion services. J. Comput. Virol. Hacking Tech. 20(2): 261-275 (2024) - [c18]Elias Seid, Mosammath Nazifa, Sneha Gupta, Oliver Popov, Fredrik Blix:
Security and SLA Monitoring for Cloud Services. ENASE 2024: 537-546 - [c17]Elias Seid, Oliver Popov, Fredrik Blix:
An Automated Adaptive Security Framework for Cyber-Physical Systems. ICISSP 2024: 242-253 - [c16]Elias Seid, Oliver Popov, Fredrik Blix:
XA4AS: Adaptive Security for Multi-Stage Attacks. IoTBDS 2024: 284-293 - 2023
- [j6]Jesper Bergman, Oliver Popov:
Exploring Dark Web Crawlers: A Systematic Literature Review of Dark Web Crawlers and Their Implementation. IEEE Access 11: 35914-35933 (2023) - [c15]Elias Seid, Oliver Popov, Fredrik Blix:
Towards Security Attack Event Monitoring for Cyber Physical-Systems. ICISSP 2023: 722-732 - 2022
- [c14]Maria Ioanna Maratsi, Oliver Popov, Charalampos Alexopoulos, Yannis Charalabidis:
Ethical and Legal Aspects of Digital Forensics Algorithms: The Case of Digital Evidence Acquisition. ICEGOV 2022: 32-40
2010 – 2019
- 2018
- [c13]Oliver Popov, Jesper Bergman, Christian Valassi:
A Framework for a Forensically Sound Harvesting the Dark Web. CECC 2018: 13:1-13:7 - 2017
- [j5]Shahzad Saleem, Oliver Popov, Ibrahim M. Baggili:
Comments on "A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis" [Digit Investig 16S, S55-S64]. Digit. Investig. 21: 88 (2017) - [c12]Igor Popov, Martin Mihajlov, Oliver Popov:
mashpoint: Surfing the web in a data-oriented way. EUROCON 2017: 50-55 - [c11]Haider Abbas, Eugenio Orlandi, Farrukh Aslam Khan, Oliver Popov, Asif Masood:
Security, Safety and Trust Management (SSTM '17). WETICE 2017: 242-243 - 2016
- [j4]Shahzad Saleem, Oliver Popov, Ibrahim M. Baggili:
A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis. Digit. Investig. 16 Supplement: S55-S64 (2016) - 2015
- [c10]Asif Iqbal, Hanan Al Obaidli, Mário Guimarães, Oliver Popov:
Sandboxing: aid in digital forensic research. InfoSecCD 2015: 3:1-3:5 - [c9]Elly Amani Gamukama, Aron Larsson, Oliver Popov, J. Y. T. Mugisha:
The Decision Model for the Internet Services in the Context of Development. ITQM 2015: 622-631 - 2014
- [j3]Maxwell Anobah, Shahzad Saleem, Oliver Popov:
Testing Framework for Mobile Device Forensics Tools. J. Digit. Forensics Secur. Law 9(2): 221-234 (2014) - [j2]Shahzad Saleem, Ibrahim M. Baggili, Oliver Popov:
Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices. J. Digit. Forensics Secur. Law 9(3): 19-50 (2014) - [c8]Elly Amani Gamukama, Oliver Popov, Aron Larsson:
A Descriptive Model for Aligning the Goals of the Internet Stakeholders in LDCs. ITQM 2014: 900-909 - [c7]Shahzad Saleem, Oliver Popov, Ibrahim Bagilli:
Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles. KES 2014: 812-821 - 2013
- [c6]Spyridon Dosis, Irvin Homem, Oliver Popov:
Semantic Representation and Integration of Digital Evidence. KES 2013: 1266-1275 - [c5]Irvin Homem, Spyridon Dosis, Oliver Popov:
LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement. WorldCIS 2013: 156-161 - 2012
- [c4]Shahzad Saleem, Oliver Popov, Oheneba Kwame Appiah-Kubi:
Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis. ICDF2C 2012: 264-282 - [c3]Daniel Huluka, Oliver Popov:
Root cause analysis of session management and broken authentication vulnerabilities. WorldCIS 2012: 82-86 - 2011
- [c2]Aleksandar Milenkoski, Biljana Stojcevska, Oliver Popov:
System for transport protocol evaluation with automatic calculation of statistical accuracy and distributed and parallel execution. SimuTools 2011: 84-86 - 2010
- [c1]Shahzad Saleem, Oliver Popov:
Protecting Digital Evidence Integrity by Using Smart Cards. ICDF2C 2010: 110-119
2000 – 2009
- 2006
- [j1]Nguyen Hong Van, Oliver Popov, Iskra Popova:
Combined Model for Congestion Control. J. Comput. Inf. Technol. 14(4): 337-342 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint