Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Vaske, Camilla
,
Mattias Weckstén
, and
Eric Jarpe
.
Velody — a novel method for music steganography
In
2017 3rd International Conference on Frontiers of Signal Processing (ICFSP)
. Paris, France, 2017.
Wu, Da-Chun
,
Chin-Yu Hsiang
, and
Ming-Yao Chen
.
"
Steganography via midi files by adjusting velocities of musical note sequences with monotonically non-increasing or non-decreasing pitches
."
IEEE Access
7 (2019): 154056-154075.
Yamamoto, Kotaro
, and
Munetoshi Iwakiri
.
A standard midi file steganography based on fluctuation of duration
In
2009 International Conference on Availability, Reliability and Security
. Fukuoka, Japan, 2009.
Wu, Da-Chun
, and
Ming-Yao Chen
.
"
Reversible data hiding in standard midi files by adjusting delta time values
."
Multimedia Tools and Applications
74, no. 21 (2015): 9827-9844.
Szczypiorski, Krzysztof
.
Stegibiza: New method for information hiding in club music
In
2016 2nd International Conference on Frontiers of Signal Processing (ICFSP)
., 2016.
Judge, James
.
Steganography: Past, present, future
In
Technical Report
., 2001.
Skúli, Sigurður
.
Classical piano composer
., 2019.
Skúli, Sigurður
.
How to generate music using a lstm neural network in keras
., 2017.
How many stars are there in the universe?
. ESA, 2020.
Tarra, Hemanth
.
Understanding Processor (% Processor Time) and Process (%Processor Time)
. Microsoft TechNet Articles, 2012.
Fritchey, Grant
.
SQL Server 2017 Query Performance Tuning
In
Disk Performance Analysis
. Apress, 2017.
Muratore, Flavio
.
Windows Performance Monitor Disk Counters Explained
., 2012.
Alnatheer, Mohammed A.
.
"
Secure Socket Layer (SSL) Impact on Web Server Performance
."
Journal of Advances in Computer Networks
2, no. 3 (2014): 211-217.
Rosenberg, Jerry L.
.
"
Measuring and Monitoring NT Performance
." In
CMG Conference
., 2001.
Kara, Ilker
.
"
Detection, Technical Analysis and Solution of Teslacrypt Ransomware Virus
."
International Journal of Management Information Systems and Computer Science
2, no. 2 (2018): 87-94.
Dell Secureworks Counter Threat Unit Threat Intelligence
In
Threat Analysis report
. TeslaCrypt Ransomware, 2015.
Kurniawan, Ade
, and
Imam Riadi
.
"
Detection and Analysis Cerber Ransomware Based on Network Forensics Behavior
."
International Journal of Network Security
20, no. 5 (2018): 836-843.
Mohurle, Savita
, and
Manisha Patil
.
"
A brief study of Wannacry Threat: Ransomware Attack 2017
."
International Journal of Advanced Research in Computer Science
8, no. 5 (2017).
Scaife, Nolen
,
Henry Carter
,
Patrick Traynor
, and
Kevin R. B. Butler
.
"
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
." In
IEEE 36th International Conference on Distributed Computing Systems
., 2016.
Counter Threat Unit Research Team
.
Threat Analysis report on WannaCry
., 2017.
Olbrich, Christian
.
A Close Look at Ransomware by the Example of Vipasana
., 2016.
Chen, Victor C.
,
David Tahmoush
, and
William J. Miceli
.
Radar Micro-Doppler Signatures: Processing and applications
. The Institution of Engineering and Technology, 2014.
Tahmoush, David
.
"
Review of micro-Doppler signatures
."
IET Radar Sonar Navigation
9, no. 9 (2015): 1140-1146.
IVS-465
In
Technical data
. Experience and Reliability in Radar-Technology, 2020.
NI My RIO 1900
In
Technical data
. National Instruments, 2020.
Pages
« първа
‹ предишна
…
423
424
425
426
427
428
429
430
431
…
следваща ›
последна »
498273 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance