Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Dimitrov, Georgi
,
Galina Panayotova
,
Eugenia Kovatcheva
,
Daniela Borissova
, and
Pavel Petrov
.
"
One Approach for Identification of Brain Signals for Smart Devices Control
."
Journal of Software
13, no. 7 (2018): 407-413.
Aras, Emekcan
,
Gowri Sankar Ramachandran
,
Piers Lawrence
, and
Danny Hughes
.
Exploring the Security Vulnerabilities of LoRa
In
2017 3rd IEEE International Conference on Cybernetics (CYBCONF)
. Exeter, UK, 2017.
Xu, Weitao
,
Sanjay Jha
, and
Wen Hu
.
"
LoRa-Key: Secure Key Generation System for LoRa-Based Network
."
IEEE Internet of Things Journal
6, no. 4 (2019): 6404-6416.
Xing, Jinyu
,
Lu Hou
,
Kuan Zhang
, and
Kan Zheng
.
An Improved Secure Key Management Scheme for LoRa System
In
2019 IEEE 19th International Conference on Communication Technology (ICCT)
. Xi'an, China, 2019.
Manoharan, Anto Merline
, and
Vimalathithan Rathinasabapathy
.
"
Secured Communication for Remote Bio-Medical Monitoring System Using LoRa
."
Sensor Letters
17, no. 11 (2019): 888-897.
Tolubko, Vladimir
,
O. Kurchenko
, and
Alina Shevchenko
.
"
Stabilization of the functional stability of the information system by controlling the dynamics of security profiles
."
Modern Information Security
3 (2018): 51-57.
Класифікація автоматизованих систем і стандартні функціональні профілі захищеності оброблюваної інформації від несанкціонованого доступу
. Департамент спеціальних телекомунікаційних систем та захисту інформації СБ України, 1999.
Критерії оцінки захищеності інформації в комп’ютерних системах від несанкціонованого доступу
. Департамент спеціальних телекомунікаційних систем та захисту інформації СБ України, 1999.
AL-Dhief, Fahad
,
Naseer Sabri
,
Abdul Latiff
,
Nik Noordini Malik
,
Musatafa Albader
,
Mazin Mohammed
,
Rami AL-Haddad
,
Yasir Salman
,
Mohd Ghani
, and
Omar Obaid
.
"
Performance Comparison between TCP and UDP Protocols in Different Simulation Scenarios
."
International Journal of Engineering & Technology
7, no. 4.36 (2018): 172-176.
Nor, hahrudin Awang
,
Raaid Alubady
, and
Wisam Abduladeem Kamil
.
"
Simulated performance of TCP, SCTP, DCCP and UDP protocols over 4G network
."
Procedia Computer Science
111 (2017): 2-7.
Baowan, Duangkamon
,
Barry James Cox
,
Tamsyn Hilder
,
James Hill
, and
Ngamta Thamwattana
.
"
Mathematical Preliminaries
." In
Modelling and Mechanics of Carbon-Based Nanostructured Materials
, 35-58. Elsevier, 2017.
The Things Network 2016 Update
., 2016.
Jebril, Akram
,
Aduwati Sali
,
Alyani Ismail
, and
Mohd Fadlee Rasid
.
"
Overcoming Limitations of LoRa Physical Layer in Image Transmission
."
Sensors
18, no. 10 (2018): 3257.
PSNR - Peak signal-to-noise ratio
., 2020.
Wang, Zhou
,
Alan Bovik
,
Hamid Rahim Sheikh
, and
Eero P. Simoncelli
.
"
Image Quality Assessment: From Error Visibility to Structural Similarity
."
IEEE Transactions on Image Processing
13, no. 4 (2004): 600-612.
LoRa
., 2020.
Kirichek, Ruslan
,
Van-Dai Pham
,
Aleksey Kolechkin
,
Mahmood Al-Bahri
, and
Alexander Paramonov
.
"
Transfer of Multimedia Data via LoRa
." In
Lecture Notes in Computer Science
, 708-720. Vol. 10531. Cham: Springer, 2017.
Lavric, Alexandru
.
"
LoRa (Long-Range) High-Density Sensors for Internet of Things
."
Journal of Sensors
, no. Special Issue (2019): 1-9.
Lowe, David G.
.
"
Distinctive Image Features from Scale-Invariant Keypoints
."
International Journal of Computer Vision
60, no. 2 (2004): 91-110.
Panayotova, Galina
,
Georgi Dimitrov
,
Pavel Petrov
, and
Bychkov Os
.
Modeling and data processing of information systems
In
016 Third International Conference on Artificial Intelligence and Pattern Recognition (AIPR)
. Lodz, Poland, 2016.
Dimitrov, Georgi
,
Bychkov Os
, and
Pavel Petrov
.
"
One Approach for Analysis of Fuzzy Linear Hybrid Automata
."
Economic Sciences Series
7, no. 2 (2018): 234-240.
Dimitrov, Georgi P.
,
Magdalena Garvanova
,
Eugenia Kovatcheva
,
Kristian Aleksiev
, and
Inna Dimitrova
.
"
Identification of EEG Brain Waves Obtained by Emotive Device
." In
2019 9th International Conference on Advanced Computer Information Technologies (ACIT)
., 2019.
Alliance C3 Strategy
. NATO, 2018.
Vaswani, Ashish
,
Noam Shazeer
,
Niki Parmar
,
Jakob Uszkoreit
,
Llion Jones
,
Aidan Gomez
,
Lukasz Kaiser
, and
Illia Polosukhin
.
"
Attention Is All You Need
." In
31st Conference on Neural Information Processing Systems (NIPS 2017)
. Long Beach, CA, USA, 2017.
Devlin, Jacob
,
Ming-Wei Chang
,
Kenton Lee
, and
Kristina Toutanova
.
BERT: Pretraining of Deep Bidirectional Transformers for Language Understanding
In
NAACL-HLT 2019
. Minneapolis, Minnesota, 2019.
Pages
« първа
‹ предишна
…
440
441
442
443
444
445
446
447
448
…
следваща ›
последна »
498062 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance