Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Zoteva, Dafina
,
Olympia Roeva
, and
Vassia Atanassova
.
"
Generalized Net Model of Artificial Bee Colony Optimization Algorithm with Intuitionistic Fuzzy Parameter Adaptation
."
Notes on Intuitionistic Fuzzy Set
24, no. 3 (2018): 92-104.
Zoteva, Dafina
,
Vassia Atanassova
,
Olympia Roeva
, and
Eulalia Szmidt
.
"
Generalized Net Model of Artificial Bee Colony Optimization Algorithm
." In
Neural Networks and Ap¬plications 2018 (ANNA’18)
. St. St. Konstantin and Elena Resort, Bulgaria, 2018.
Spencer, Robert
.
The Palestinian Delusion: The Catastrophic History of the Middle East Peace Process
. Bombardier Books, 2019.
Heisenberg, Werner
.
"
Uber den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik
."
Zeitschrift fur Physik
43 (1927): 172-198.
Van Assche, Gilles
.
Quantum Cryptography and Secret-Key Distillation
. Cambridge: Cambridge University Press, 2006.
Bennett, Charles H.
, and
Gilles Brassard
.
Public Key Distribution and Coin Tossing
In
IEEE International Conference on Computers, Systems, and Signal Processing
., 1984.
Niemiec, Marcin
, and
Andrzej R. Pach
.
"
The Measure of Security in Quantum Cryptography
." In
Cryptog¬raphy,” IEEE Global Telecommunications Conference - GLOBECOM (2012)
., 2012.
Niemiec, Marcin
, and
Andrzej R. Pach
.
"
Management of security in quantum cryptography
."
IEEE Communications Magazine
51, no. 8 (2013): 36-41.
Hartley, Ralph V.
.
"
Transmission of information
."
Bell System Technical Journal
7 (1928): 535-563.
Niemiec, Marcin
.
Design, Construction and Verification of a High-Level Security Protocol Allowing to Apply the Quantum Cryptography in Communication Networks
. Vol. Ph.D. Thesis. AGH University of Science and Technology, 2011.
Niemiec, Marcin
,
Łukasz Romański
, and
Marcin Święty
.
"
Quantum cryptography protocol simulator
."
Communications in Computer and Information Science, Multimedia communications, services and security
149 (2011): 286-292.
Random number generation using quantum physics
.
Random number generation using quantum physics
., 2010.
Bennett, Charles H.
, and
J. Wiesner
.
"
Communication via one- and two-particle operators on Einstein–Podolsky–Rosen states
."
Phys. Rev. Lett.
69 (1992): 2881-2884.
Roberts, Lawrence G.
.
"
ALOHA Packet System With and Without Slots and Capture
."
Computer Communications Review
5, no. 2 (1975): 28-42.
Imre, Sandor
.
"
Quantum Hyperdense Coding for Distributed Communications
."
Quantum Physics
arXiv:1210.2856 (2012).
Ekert, Artur
,
Patrick Hayden
, and
Hitoshi Inamori
.
"
Basic concepts in quantum computation
."
Quantum Physics
arXiv:quant-ph/0011013 (2010).
Grove, Lov K.
.
"
A fast quantum mechanical algorithm for database search
."
Quantum Physics
arXiv:quant-ph/9605043 (1996).
Shor, Peter W.
.
Algorithms for quantum computation: discrete logarithms and factoring
In
Annual Symposium on Foundations of Computer Science
. Santa Fe, NM, USA , 1994.
Wehner, Stephanie
,
David Elkouss
, and
Ronald Hanson
.
"
Quantum Internet: A Vision for the Road Ahead
."
Science
362, no. 6412 (2018).
Korus, Paweł
, and
Andrzej Dziech
.
"
Efficient Method for Content Reconstruction with Self-Embedding
."
IEEE Transaction on Image Processing
22, no. 3 (2013): 1134-1147.
Alexandre, Girod
.
"
Computerized Classification of the Shoeprints of Burglar’s Soles
."
Forensic Science International
82, no. 1 (1996): 59-65.
Murray, Edelman J.
.
"
Footprints Can Play an Important Role in Solving Crimes
."
Footprint Lab.
(2011).
Srihari, Sargur N.
.
Analysis of Footwear Impression Evidence
In
US DoJ Report
., 2011.
Adair., T. W.
,
J. Lemay
,
A. Mcdonald
,
R. Shaw
, and
R. Tewes
.
"
The Mount Bierstadt Study: An Experiment in Unique Damage Formation in Footwear
."
Journal of Forensic Identification
57, no. 2 (2007): 199-205.
Ashley, Wayne
.
"
What Shoe Was That? The use of Computerised Image Database to Assist in Identification
."
Forensic Science International
82, no. 1 (1996): 7-20.
Pages
« първа
‹ предишна
…
378
379
380
381
382
383
384
385
386
…
следваща ›
последна »
372839 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance