Oliver Popov

Learn More
In a digital world, even illegal behaviour and/or crimes may be termed as digital. This world is increasing becoming mobile, where the basic computation and communication entities are Small Scale Digital Devices (SSDDs or S2D2s) such as ordinary mobile phones, personal digital assistants, smart phones and tablets. The need to recover data, which might refer(More)
In this work, a survey was conducted to help quantify the relevance of nineteen types of evidence (such as SMS) to seven types of digital investigations associated with mobile devices (MD) (such as child pornography). 97 % of the respondents agreed that every type of digital evidence has a different level of relevance to further or solve a particular(More)
In this paper we have presented quantitative analysis technique to measure and compare the quality of mobile device forensics tools while evaluating them. For examiners, it will provide a formal mathematical base and an obvious way to select the best tool, especially for a particular type of digital evidence in a specific case. This type of comparative(More)
The ever-increasing complexity and sophistication of computer and network attacks challenge society's dependability on digital infrastructure. Digital investigations recover and reconstruct the digital trails of such events and may employ practices from various subfields (computer, network forensics), each with its own set of techniques and tools.(More)
A flexible chaotic ultra-wideband (UWB) communication system with an adjustable channel spectrum is proposed. Since the chaotic UWB bandwidth (BW) is independent of the data rate, the system band plan can be flexibly organized for various communication environments. The proposed system can overcome the spectral inefficiency and RF power wastage that is(More)
Efficiency and fairness are main objectives in any system design and many choices in life are made based on their tradeoffs. In this paper we introduce a framework for the evaluation of efficiency-fairness tradeoffs that would provide a sound basis for network providers and social planners to provide or plan for an equitable access to the Internet to a(More)
Given the complexity and velocity of the interactions among vastly heterogeneous elements on the Internet; the colossal amounts of information generated and exchanged, coupled with the increasingly evasive nature of new forms of electronic crimes, as well as the relative immaturity of current Digital Forensics tools, Law Enforcement Agencies are easily(More)
The omnipresence of e-services running on various instances of pervasive e-infrastructures that are fundamental to the contemporary information society generates an abundance of digital evidence. The evidence in a digital form stems from a myriad of sources ranging from stand alone computers and their volatile and non-volatile storages, to mobile small(More)
The growth of multimedia applications on the Internet made at least one fifth of the total network traffic to run over UDP. Unlike TCP, UDP is unresponsive to network congestion. This may cause, interalia, bandwidth starvation of responsive flows, severe and prolonged congestions or in the worst-case scenario a congestion collapse. Hence, the coexistence of(More)