Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
DPIA pre-assessment Report, v0.2
. ECHO, 2019.
Henriksen-Bulmer, Jane
.
Incorporating contextual integrity into privacy decision making: a risk based approach
. Bournemouth University, 2019.
Franke, Ulrik
, and
Joel Brynielsson
.
"
Cyber situational awareness - A systematic review of the literature
."
Computers & Security
46 (2014): 18-31.
Endsley, Mica
.
"
Design and Evaluation for Situation Awareness Enhancement
."
Human Factors Society Annual Meeting
32, no. 2 (1988): 97-101.
Chertov, Oleg
,
Taras Rudnyk
, and
Oleksandr Palchenko
.
Search of phony accounts on Facebook. Ukrainian case
In
International Conference on Military Communications and Information Systems (ICMCIS2018)
. Warsaw, Poland: IEEE Xplore, 2018.
Let, V. V.
, and
I.S. Skitter
.
Determination of non-standard behavior of the network by methods of statistical analysis
In
Thirteenth International Scientific and Practical Conference "Mathematical and Simu-lation Modeling of Systems MODS 2018"
. Chernihiv-Kiev-Zhukin, 2018.
Skiter, I. S.
.
Methods of forming an image of a normal computer behavior Networks
In
III International Conference "Problems of Decommissioning of Objects nuclear energy and the restoration of the environment," INUDECO
. Slavutych, 2018.
Smola, Alex
, and
S.V.N. Vishwanathan
.
Introduction to Machine Learning
. Cambridge University Press, 2008.
Wlodarczak, Peter
.
Machine Learning and its Applications
. CRC Press, 2019.
Gros, Xavier
.
NDT Data Fusion
. Great Britain: Amold, 1997.
Stoianov, Nikolai
, and
Maya Bozhilova
.
"
Expert’s study on situational awareness of operations directed at the wide dissemination of malicious information
." In
Conference Proceedings, MODS2020
. Chernihiv, Ukraine, 2020.
Chen, Qi
,
Amanda Whitbrook
,
Uwe Aickelin
, and
Chris Roadknight
.
"
Data classification using the Dempster–Shafer method
."
Journal of Experimental & Theoretical Artificial Intelligence
26, no. 4 (2014): 493-517.
Gordon, Jean
, and
Edward H. Shortliffe
.
The Dempster-Shafer theory of evidence. Readings in uncertain reasoning
. San Francisco, CA, USA: Morgan Kaufmann Publishers, 1990.
Zheng, Weifa
.
Research on situation awareness of network security assessment based on dempster-shafer
In
2019 International Conference on Computer Science Communication and Network Security (CSCNS2019)
. Vol. 309. MATEC Web of Conferences, 2020.
Chen, Gang
,
Jun Ping Cai
, and
Jun Yang
.
"
Network Security Situation Awareness Based on Multi-source Data Fusion
."
Advanced Materials Research
989-994 (2014): 4885-4888.
The CyRADARS web site
., 2020.
Proactive detection of security incidents II – Honeypots
. ENISA, 2012.
NATO Science for Peace and Security Programme Homepage
., 2020.
Wardle, Claire
, and
Hossein Derakhshan
.
Council of Europe’s Information Disorder Report: Toward an interdisciplinary framework for research and policymaking
. 2nd revised edition., 2018.
Glastopf
., 2020.
Dionaea
., 2020.
EUvsDisinfo
., 2020.
Shafie, Ana
,
Nurfadhlina Sharef
,
Masrah Murad
, and
Azreen Azman
.
"
Aspect Extraction Performance With POS Tag Pattern of Dependency Relation in Aspect-based Sentiment Analysis
." In
2018 Fourth International Conference on Information Retrieval and Knowledge Management (CAMP)
. Kota Kinabalu, Malaysia, 2018.
Berthold, Michael
,
Nicolas Cebron
,
Fabian Dill
,
Thomas Gabriel
,
Tobias Kötter
,
Thorsten Meinl
,
Peter Ohl
,
Christoph Sieb
,
Kilian Thiel
, and
Bernd Wiswedel
.
"
KNIME: The Konstanz Information Miner
." In
Data Analysis, Machine Learning and Applications; Studies in Classification, Data Analysis, and Knowledge Organization
. Springer, 2007.
Mestric, Ivana Ilic
,
Arvid Kok
,
Giavid Valiyev
, and
Michael Street
.
Technical Report: Exploration of NATO Exercise Big Data for Lessons Learned
. The Hague: NCI Agency, 2019.
Pages
« първа
‹ предишна
…
432
433
434
435
436
437
438
439
440
…
следваща ›
последна »
498143 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance