Oliver Popov

Orcid: 0000-0001-6176-6817

According to our database1, Oliver Popov authored at least 23 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Recognition of tor malware and onion services.
J. Comput. Virol. Hacking Tech., June, 2024

An Automated Adaptive Security Framework for Cyber-Physical Systems.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Exploring Dark Web Crawlers: A Systematic Literature Review of Dark Web Crawlers and Their Implementation.
IEEE Access, 2023

Towards Security Attack Event Monitoring for Cyber Physical-Systems.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Ethical and Legal Aspects of Digital Forensics Algorithms: The Case of Digital Evidence Acquisition.
Proceedings of the 15th International Conference on Theory and Practice of Electronic Governance, 2022

2018
A Framework for a Forensically Sound Harvesting the Dark Web.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

2017
Comments on "A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis" [Digit Investig 16S, S55-S64].
Digit. Investig., 2017

Security, Safety and Trust Management (SSTM '17).
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

mashpoint: Surfing the web in a data-oriented way.
Proceedings of the IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017

2016
A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis.
Digit. Investig., 2016

2015
The Decision Model for the Internet Services in the Context of Development.
Proceedings of the Third International Conference on Information Technology and Quantitative Management, 2015

Sandboxing: aid in digital forensic research.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

2014
Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices.
J. Digit. Forensics Secur. Law, 2014

Testing Framework for Mobile Device Forensics Tools.
J. Digit. Forensics Secur. Law, 2014

Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles.
Proceedings of the 18th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2014

A Descriptive Model for Aligning the Goals of the Internet Stakeholders in LDCs.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

2013
LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement.
Proceedings of the 2013 World Congress on Internet Security, 2013

Semantic Representation and Integration of Digital Evidence.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

2012
Root cause analysis of session management and broken authentication vulnerabilities.
Proceedings of the 2012 World Congress on Internet Security, 2012

Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

2011
System for transport protocol evaluation with automatic calculation of statistical accuracy and distributed and parallel execution.
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011

2010
Protecting Digital Evidence Integrity by Using Smart Cards.
Proceedings of the Digital Forensics and Cyber Crime, 2010

2006
Combined Model for Congestion Control.
J. Comput. Inf. Technol., 2006


  Loading...