Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Linkov, Igor
,
Daniel Eisenberg
,
Kenton Plourde
,
Thomas P. Seager
,
Julia Allen
, and
Alexander Kott
.
"
Resilience metrics for cyber systems
."
Environment Systems & Decisions
33, no. 4 (2013).
Kott, Alexander
, and
Igor Linkov
.
Cyber Resilience of Systems and Networks. Risk, System and Decisions
. Cham: Springer, 2019.
Heinimann, Hans
, and
Kirk Hatfield
.
"
Infrastructure Resilience Assessment, Management and Governance – State and Perspectives
." In
Resilience and Risk
, 147-187. Cham: NATO Science for Peace and Security Series C: Environmental Security, Springer , 2017.
Kokkonen, Tero
.
"
Anomaly-Based Online Intrusion Detection System as a Senor for Cyber Security Situational Awareness System
."
Jyväskylä studies in computing, University of Jyväskylä
251 (2016).
Rajamäki, Jyri
, and
Rauno Pirinen
.
Towards the cyber security paradigm of eHealth: Resilience and design aspects
In
Proceedings of the 1st International Conference on Applied Mathematics and Computer Science
. Vol. 1836. Melville: AIP Publishing, 2017.
FortiWeb 5.7.1 Administration Guide: Solutions for specific web attacks
. Fortine, 2020.
Internet Security Threat Report. Vol. 24
. Symantec, 2019.
Stetsenko, Inna V.
, and
Vitalii Lytvynov
.
"
Computer Virus Propagation Petri-Object Simulation
." In
Advances in Intelligent Systems and Computing 1019
, 103-112. Cham: Springer, 2020.
Web Applications vulnerabilities and threats: statistics for 2019
. Positive Technologies, 2020.
Axelsson, Stefan
.
Intrusion Detection Systems: A Survey and Taxonomy
., 2020.
Stoianov, Nicolai
,
Vitalii Lytvynov
,
Igor Skiter
, and
Svitlana Lytvyn
.
"
Traffic Abnormalities Identification Based on the Stationary Parameters Estimation and Wavelet Function Detailization
." In
Advances in Intelligent Systems and Computing 1019
, 83-95. Cham: Springer, 2020.
Hindy, Hanan
,
Elike Hodo
,
Ethan Bayne
,
Amar Seeam
,
Robert Atkinson
, and
Xavier Bellekens
.
A Taxonomy of Malicious Traffic for Intrusion Detection Systems
In
2018 IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA)
. Glasgow, UK., 2018.
Khraisat, Ansam
,
Iqbal Gondal
,
Peter Vamplew
, and
Joarder Kamruzzaman
.
"
Survey of intrusion detection systems: techniques, datasets and challenges
."
Cybersecurity
2 (2019).
Attack Signatures
. Broadcom, 2020.
Dong, Ying
,
Yuqing Zhang
,
Hua Ma
,
Qianru Wu
,
Qixu Liu
,
Kai Wang
, and
Wenjie Wang
.
"
An adaptive system for detecting malicious queries in web attacks
."
Science China Information Sciences
61 (2018).
"
Evading IDS, Firewalls and Detecting Honeypots
." In
Ethical hacking and countermeasures: Secure Network Operating Systems and Infrastructures
, 77-134. Second ed. Boston, USA: Cengage Learning, 2016.
Day, David J.
,
Denys A. Flores
, and
Harjinder Singh Lallie
.
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection
In
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
. Liverpool, UK: TrustCom , 2012.
Gupta, Megha
.
"
Hybrid Intrusion Detection System: Technology and Development
."
International Journal of Computer Applications
115, no. 9 (2015): 5-8.
Man in the middle (MITM) attack
. Imperva, 2020.
Smith, Bryant
.
Advanced Malware Detection with Suricata Lua Scripting
. Trustwave, 2017.
Understanding Heuristic-based Scanning vs. Sandboxing
. Opswat, 2015.
Milenkoski, Aleksandr
,
Varco Vieira
,
Samuel Kounev
,
Alberto Avritzer
, and
Bryan D. Payne
.
"
Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices
."
ACM Computing surveys
48, no. 1 (2015): 1-41.
Burmaka, Ivan
,
Nicolai Stoianov
,
Vitalii Lytvynov
,
Mariia Dorosh
, and
Svitlana Lytvyn
.
"
Proof of Stake for Blockchain Based Distributed Intrusion Detecting System
." In
Advances in Intelligent Systems and Computing 1265
, 237-247. Cham: Springer, 2021.
Djebbar, Fatiha
,
Beghdad Ayad
,
Karim Abed Meraim
, and
Habib Hamam
.
"
Comparative study of digital audio steganography techniques
."
EURASIP Journal on Audio, Speech, and Music Processing
1 (2012): 25.
Adli, A.
, and
Z. Nakao
.
Three steganography algorithms for midi files
In
2005 International Conference on Machine Learning and Cybernetics
. Vol. 4. Guangzhou, China, 2005.
Pages
« първа
‹ предишна
…
422
423
424
425
426
427
428
429
430
…
следваща ›
последна »
498237 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance