Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Antonov, Petar
.
Naruchnik po criptographia i zashtita na dannite
. TU Varna, 2014.
Antonov, Petar
, and
Valentina Аntonova
.
Analiz na sigurnosta na parolnite frazi
In
Konferentsiya na tema „Politikata na Evropeĭskiya sŭyuz po zashtitata na informatsiyata i lichnite danni"
. Shumen: Natsionalen voenen universitet ―Vasil Levski , 2018.
Antonov, Petar
,
Valentina Аntonova
, and
D. Razsadov
.
An approach and a software system of choosing reliable password phrases for resource access control
In
"TEHNONAV 2002"
. Constanta (Romania): Ovidius University Press, 2002.
Antonov, Petar
, and
Valentina Аntonova
.
Access Control in the Virtual Education Area
In
Fourth Intern. Bulgarian-Greek Conf. Computer Science’08
. Kavala, Greece, 2008.
Bonneau, Joseph
.
Deep Dive: EFF’s New Wordlists for Random Passphrases
. Electronic Frontier Foundation, 2016.
Diceware™ Randomized Word Lists (Bulgarian): Diceware Randomized Word
., 2020.
Grassi, Paul A.
.
Digital Identity Guidelines. Authentication and Lifecycle Management
In
Special Publication
. Department of Commerce, NIST, 2017.
Reinhold, Arnold G.
.
The Diceware Passphrase Home Page
., 2020.
The Diceware Passphrase FAQ
., 2020.
van Steen, Maarten
, and
Andrew S. Tanenbaum
.
"
A Brief Introduction to Distributed Systems
."
Computing
98 (2016): 967-1009.
Kumar, Ashok
, and
Venugopalan Srinivasag Rajan
.
"
Intrusion Detection Systems: A Review
."
An International Journal of Advanced Research in Computer Science
8, no. 8 (2017): 356-370.
Joyce, Jeffrey
,
Greg Lomow
,
Konrad Slind
, and
Brian Unger
.
"
Monitoring Distributed Systems
."
An ACM Transactions on Computer Systems
5, no. 2 (1987): 121-150.
Behal, Sunny
, and
Krishan Kumar
.
"
Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review
."
International Journal of Network Security
19, no. 3 (2017): 383-393.
Bikbulatov, Timur
, and
Ilya Kurochkin
.
"
Simulation of DDoS attack on software defined networks
."
AIP Conference Proceedings
2181, no. 1 (2019): 020022.
Joshi, Manish
, and
Theyazn Hassn Hadi
.
"
A review of network traffic analysis and prediction techniques
."
arXiv preprint arXiv
(2015): 1507.05722.
MongoDB
., 2020.
Lytvynov, Vitalii
,
Mariia Dorosh
,
Iryna Bilous
,
Mariia Voitsekhovska
, and
Valentyn Nekhai
.
"
Development of the automated information system for organization’s information security culture level assessment
."
Technical sciences and technologie
1, no. 19 (2020): 124-32.
CyRADARS Cyber Rapid Analysis for Defense Awareness of Real-Time Situation
., 2020.
Number of smartphones sold to end users worldwide from 2007 to 2020
., 2020.
Top 7 Mobile Security Threats in 2020
., 2020.
Bellardo, John
, and
Stefan Savage
.
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
. San Diego: Department of Computer Science and Engineering, University of California, 2020.
ESP8266 Introduction
., 2020.
esp8266_deauther
., 2020.
Semtech: AN1200.22 - LoRa Modulation Basics
., 2015.
Semtech: SX1276/77/78/79 Datasheet
., 2016.
Pages
« първа
‹ предишна
…
443
444
445
446
447
448
449
450
451
…
следваща ›
последна »
497996 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance