Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Lopez, Javier
,
Rodrigo Roman
, and
Cristina Alcaraz
.
"
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks
." In
Foundations of Security Analysis and Design V
, 289-338. Vol. Lecture Notes in Computer Science, vol. 5705. Berlin, Heidelberg: Springer, 2009.
Sibilio, Eleonora
.
Formal Methods for Wireless Systems
. Vol. PhD Thesis. Verona, Italy: Dipartimento di Informatica, Universit`a di Verona, 2011.
Abadi, Martin
, and
Bruno Blanchet
.
"
Analyzing Security Protocols with Secrecy Types and Logic Programs
."
Journal of the ACM
52, no. 1 (2005): 102-146.
Roman, Rodrigo
,
M.Carmen Fernandez-Zago
,
Javier Lopez
, and
Chen Hsiao-Hwa
.
"
Trust and Reputation Systems for Wireless Sensor Networks
." In
Security and Privacy in Mobile and Wireless Networking
, 105-127. Leicester, UK: Troubador, 2009.
Balakrishnan, Venkat
,
Vijay Varadharajan
, and
Uday Tupakula
.
"
Trust Management in Mobile Ad Hoc Networks
." In
Guide to Wireless Ad Hoc Networks
, 473-502. London: Springer, 2009.
Vasudevan, Sudarshan
,
Jim Kurose
, and
Don Towsley
.
Design and Analysis of a Leader Election Algorithm for Mobile Ad Hoc Networks
In
Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004
. IEEE Computer Society, 2004.
Hentea, Mariana
.
"
Intelligent System for Information Security Management: Architecture and Design Issues
."
Issues in Informing Science & Information Technology
4 (2007): 29-40.
Anifowose, Fatai Adesina
, and
Safiriyu Ibiyemi Eludiora
.
"
Application of Artificial Intelligence in Network Intrusion Detection
."
World Applied Programming
2, no. 3 (2012): 158-166.
Multi-Agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic
In
Computer Networks Communications in Computer and Information Science, Proceedings of the 20th International Conference on Computer Networks CN 2013
. Vol. 370. Lwówek Śląski, Poland, 2013.
S., Lysenko
,
Savenko O.
,
A. Kryshchuk
, and
Y. Klyots
.
Botnet detection technique for corporate area network
In
Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems
. Berlin, DE: IEEE, 2013.
Pereverzeva, Inna
.
Formal Development of Resilient Distributed Systems
. Vol. PhD Dissertation. Turku, Finland: Abo Akademi University, Faculty of Science and Engineering, 2015.
Laprie, Jean-Claude
.
Resilience for the Scalability of Dependability
In
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications, NCA'05
., 2005.
Abrial, Jean-Raymond
.
The B-Book: Assigning Programs to Meanings
. Cambridge, UK: Cambridge University Press, 1996.
Abrial, Jean-Raymond
.
Modeling in Event-B: System and Software Engineering
. Cambridge, UK: Cambridge University Press, 2010.
Iliasov, Alexei
,
Elena Troubitsyna
,
Linas Laibinis
,
Alexander Romanovsky
,
Kimmo Varpaaniemi
,
Dubravka Ilic
, and
Timo Latvala
.
"
Developing Mode-Rich Satellite Software by Refinement in Event-B
." In
Formal Methods for Industrial Critical Systems, FMICS 2010
. Springer, 2010.
Tarasyuk, Anton
,
Elena Troubitsyna
, and
Linas Laibinis
.
Formal Modelling and Verification of Service-Oriented Systems in Probabilistic Event-B
In
Proceedings of the International Conference on Integrated Formal Methods, IFM 2012
., 2012.
Prokhorova, Yuliya
,
Linas Laibinis
,
Elena Troubitsyna
,
Kimmo Varpaaniemi
, and
Timo Latvala
.
Derivation and Formal Verification of a Mode Logic for Layered Control Systems
In
Proceedings of the 18th Asia-Pacific Software Engineering Conference, APSEC 2011
. IEEE, 2011.
Pereverzeva, Inna
,
Elena Troubitsyna
, and
Linas Laibinis
.
Formal Goal-Oriented Development of Resilient MAS in Event-B
In
Proceedings of 17th International Conference on Reliable Software Technologies
. Berlin, Heidelberg: Springer-Verlag, 2012.
Avgeriou, Paris
.
Software Engineering for Resilient Systems
In
Proceedings of 4th International Workshop on SERENE 2012
. Berlin, Heidelberg: Springer-Verlag, 2012.
Simulation Framework in Python
., 2016.
Gordieiev, Oleksandr
,
Taras Lobur
, and
Ruslan Kozak
.
"
Integrating Cisco Systems’ Educational Programs in ICT Security Academic Curricula
."
Information & Security: An International Journal
35, no. 2 (2016): 151-163.
Multivendor and Academic Consortium: The European ICT competencies Frame and Multi-user Technology One Computer
In
Technical Report (in Russian)
., 2016.
Growth of IT-specialists Quantity on the Separate Types of the Certification Programs
. Monster Blog, 2016.
"
Review of European Standards on ICT competences
."
Information Management (in Russian)
7 (2013): 30-35.
Networking Academy Course List
. Cisco Networking Academy, 2016.
Pages
« първа
‹ предишна
…
210
211
212
213
214
215
216
217
218
…
следваща ›
последна »
469823 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all