Finite state machine approach to digital event reconstruction P Gladyshev, A Patel Digital Investigation 1 (2), 130-149, 2004 | 164 | 2004 |
Challenges with automation in digital forensic investigations JI James, P Gladyshev arXiv preprint arXiv:1303.4498, 2013 | 71 | 2013 |
An intrusion and defense testbed in a cyber-power system environment J Hong, SS Wu, A Stefanov, A Fshosha, CC Liu, P Gladyshev, ... 2011 IEEE Power and energy society general meeting, 1-5, 2011 | 67 | 2011 |
Finite state machine analysis of a blackmail investigation P Gladyshev, A Patel International Journal of Digital Evidence 4 (1), 1-13, 2005 | 63 | 2005 |
Formalising event time bounding in digital investigations P Gladyshev, A Patel International Journal of Digital Evidence 4 (2), 1-14, 2005 | 62 | 2005 |
Formalising event reconstruction in digital investigations P Gladyshev http://formalforensics.org/publications/thesis/, 2004 | 62 | 2004 |
Analysis of evidence using formal event reconstruction J James, P Gladyshev, MT Abdullah, Y Zhu Digital Forensics and Cyber Crime: First International ICST Conference …, 2010 | 45 | 2010 |
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview JI James, P Gladyshev Digital investigation 10 (2), 148-157, 2013 | 41 | 2013 |
Automated inference of past action instances in digital investigations JI James, P Gladyshev International Journal of Information Security 14, 249-261, 2015 | 39 | 2015 |
A framework for harmonizing forensic science practices and digital/multimedia evidence M Pollitt, E Casey, DO Jaquet-Chiffelle, P Gladyshev Organization of Scientific Area Committees for Forensic Science (OSAC), 2018 | 36 | 2018 |
Bredolab: Shopping in the cybercrime underworld D de Graaf, AF Shosha, P Gladyshev Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013 | 30 | 2013 |
Detecting cyber intrusions in SCADA networks using multi-agent collaboration AF Shosha, P Gladyshev, SS Wu, CC Liu 2011 16th International conference on intelligent system applications to …, 2011 | 30 | 2011 |
Using shellbag information to reconstruct user activities Y Zhu, P Gladyshev, J James digital investigation 6, S69-S77, 2009 | 29 | 2009 |
A survey of mutual legal assistance involving digital evidence JI James, P Gladyshev Digital Investigation 18, 23-32, 2016 | 25 | 2016 |
Decision-theoretic file carving P Gladyshev, JI James Digital Investigation 22, 46-61, 2017 | 24 | 2017 |
Evasion-resistant malware signature based on profiling kernel data structure objects AF Shosha, CC Liu, P Gladyshev, M Matten 2012 7th International Conference on Risks and Security of Internet and …, 2012 | 24 | 2012 |
Signature based detection of user events for post-mortem forensic analysis JI James, P Gladyshev, Y Zhu Digital Forensics and Cyber Crime: Second International ICST Conference …, 2011 | 23 | 2011 |
User requirements of trusted third parties in Europe D Lekkas, SK Katsikas, DD Spinellis, P Gladychev, A Patel Proceedings, User identification and Privacy Protection Joint IFIP WG 8, 229-242, 1999 | 21 | 1999 |
Rigorous development of automated inconsistency checks for digital evidence using the B method P Gladyshev, A Enbacka International Journal of Digital Evidence 6 (2), 1-21, 2007 | 20 | 2007 |
Digital forensic investigation and cloud computing JI James, AF Shosha, P Gladyshev Cybercrime and cloud forensics: Applications for investigation processes, 1-41, 2013 | 17 | 2013 |