Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Semtech: AN1200.13 - SX1272/3/6/7/8 LoRa Modem Design Guide
., 2013.
LoRaWAN specification
. LoRa Alliance, 2018.
ETSI EN 300 220-2 (V3.2.1)
., 2018.
Semtech: ANNWS.01.2.1.W.SYS - LoRaWAN Network Server Demonstration: Gateway to Server Interface Definition
In
Revision 1.0
., 2015.
Semtech SX1301 Datasheet (V2.4)
., 2017.
Canada, Government of
.
Improving Marine Safety through the Oceans Protection Plan
., 2019.
England Coast Path: Improving Public Access to the Coast
. Government of UK, 2014.
Resolution A.1106(29) - Revised Guidelines for the onboard operational use of shipborne automatic identification systems (AIS)
., 2016.
"
Resolution MSC.74(69) includes Recommendation on Performance Standards for Universal Automatic Identification System (AIS)
.", 1998.
Tools for network planning and optimization
., 2018.
Ou, Helen H.
,
Pasang Sherpa
, and
Lisa M. Zurk
.
"
Tracking of Small Vessels with Passive Acoustic Sensors
."
The Journal of the Acoustical Society of America
130, no. 4 (2011): 2450.
Tesei, Alessandra
,
Stefano Fioravanti
,
Vittorio Grandi
,
Piero Guerrini
, and
Alain Maguer
.
"
Localization of Small Surface Vessels through Acoustic Data Fusion of Two Tetrahedral Arrays of Hydrophones
."
Meetings on Acoustics
17, no. 1 (2012).
Chung, Kil Woo
,
Alexander Sutin
,
Alexander Sedunov
, and
Michael Bruno
.
"
DEMON Acoustic Ship Signature Measurements in an Urban Harbor
."
Advances in Acoustics and Vibration
(2011): article 952798.
Zemmari, Reda
,
Martina Daun
,
Michael Feldmann
, and
Ulrich Nickel
.
"
Maritime Surveillance with GSM Passive Radar: Detection and Tracking of Small Agile Targets
." In
14th International Radar Symposium
. Dresden, Germany, 2013.
Duand, Miao
, and
Kun Wang
.
"
An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things
."
IEEE Transactions on Industrial Informatics
16, no. 1 (2020): 648-657.
Zhang, Weizhe
,
Bin Zhang
,
Ying Zhou
,
Hui He
, and
Zeyu Ding
.
"
An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks
."
IEEE Internet of Things Journal
7, no. 5 (2020): 3991-3999.
Aleksandrova, Veselina
,
KostadinVarbanov
, and
Violeta Vasileva
.
Application of Sustainable Technologies and Internet of Things in the Security and Defense Area
In
International Scientific Conference "Challenges to the EU and NATO in the context of radicalization, terrorism and migration
. Sofia: Military Academy “G.S. Rakovski”, 2018.
Bozhilova, Maya
, and
Grigor Velev
.
A formal models for mobile AD HOC networks group interactions
In
Proceedings of the Eighth International Scientific Conference ‘HEMUS-2016’
., 2016.
Mahlyanov, Dobrin
, and
Nikolai Stoianov
.
Security of Internet of Things – IoT
In
Eighth International Scientific Conference ‘HEMUS-2016’
., 2016.
Stoianov, Nikolai
,
Maya Bozhilova
, and
Grigor Velev
.
Towards Security Requirements of the SPIDER Projec
In
Scientific Conference with International Participation on Cyber security in the Information Society
. Shumen, Bulgaria, 2017.
Mahlyanov, Dobrin
, and
Nikolai Stoianov
.
Cyber Security Analysis for Internet of Military Things Models
In
Scientific Conference with International Participation on Cyber security in the Information Society
. Shumen, Bulgaria, 2017.
SNORT
., 2020.
Sentry Tools
., 2020.
Shi, Leyi
,
Yang Li
,
Tianxu Liu
,
Jia Liu
,
Baoying Shan
, and
Honglong Chen
.
"
Dynamic Distributed Honeypot Based on Blockchain
."
IEEE Access
7 (2019): 72234-72246.
How to Install Snort NIDS on Ubuntu Linux
. Rapid 7 Blog, 2017.
Pages
« първа
‹ предишна
…
444
445
446
447
448
449
450
451
452
…
следваща ›
последна »
497994 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance