Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Stetsenko, Inna V.
, and
Vitalii Lytvynov
.
"
Computer Virus Propagation Petri-Object Simulation
." In
Advances in Intelligent Systems and Computing 1019
, 103-112. Cham: Springer, 2020.
Web Applications vulnerabilities and threats: statistics for 2019
. Positive Technologies, 2020.
Axelsson, Stefan
.
Intrusion Detection Systems: A Survey and Taxonomy
., 2020.
Stoianov, Nicolai
,
Vitalii Lytvynov
,
Igor Skiter
, and
Svitlana Lytvyn
.
"
Traffic Abnormalities Identification Based on the Stationary Parameters Estimation and Wavelet Function Detailization
." In
Advances in Intelligent Systems and Computing 1019
, 83-95. Cham: Springer, 2020.
Hindy, Hanan
,
Elike Hodo
,
Ethan Bayne
,
Amar Seeam
,
Robert Atkinson
, and
Xavier Bellekens
.
A Taxonomy of Malicious Traffic for Intrusion Detection Systems
In
2018 IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA)
. Glasgow, UK., 2018.
Khraisat, Ansam
,
Iqbal Gondal
,
Peter Vamplew
, and
Joarder Kamruzzaman
.
"
Survey of intrusion detection systems: techniques, datasets and challenges
."
Cybersecurity
2 (2019).
Attack Signatures
. Broadcom, 2020.
Dong, Ying
,
Yuqing Zhang
,
Hua Ma
,
Qianru Wu
,
Qixu Liu
,
Kai Wang
, and
Wenjie Wang
.
"
An adaptive system for detecting malicious queries in web attacks
."
Science China Information Sciences
61 (2018).
"
Evading IDS, Firewalls and Detecting Honeypots
." In
Ethical hacking and countermeasures: Secure Network Operating Systems and Infrastructures
, 77-134. Second ed. Boston, USA: Cengage Learning, 2016.
Day, David J.
,
Denys A. Flores
, and
Harjinder Singh Lallie
.
CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection
In
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
. Liverpool, UK: TrustCom , 2012.
Gupta, Megha
.
"
Hybrid Intrusion Detection System: Technology and Development
."
International Journal of Computer Applications
115, no. 9 (2015): 5-8.
Man in the middle (MITM) attack
. Imperva, 2020.
Smith, Bryant
.
Advanced Malware Detection with Suricata Lua Scripting
. Trustwave, 2017.
Understanding Heuristic-based Scanning vs. Sandboxing
. Opswat, 2015.
Milenkoski, Aleksandr
,
Varco Vieira
,
Samuel Kounev
,
Alberto Avritzer
, and
Bryan D. Payne
.
"
Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices
."
ACM Computing surveys
48, no. 1 (2015): 1-41.
Burmaka, Ivan
,
Nicolai Stoianov
,
Vitalii Lytvynov
,
Mariia Dorosh
, and
Svitlana Lytvyn
.
"
Proof of Stake for Blockchain Based Distributed Intrusion Detecting System
." In
Advances in Intelligent Systems and Computing 1265
, 237-247. Cham: Springer, 2021.
Djebbar, Fatiha
,
Beghdad Ayad
,
Karim Abed Meraim
, and
Habib Hamam
.
"
Comparative study of digital audio steganography techniques
."
EURASIP Journal on Audio, Speech, and Music Processing
1 (2012): 25.
Adli, A.
, and
Z. Nakao
.
Three steganography algorithms for midi files
In
2005 International Conference on Machine Learning and Cybernetics
. Vol. 4. Guangzhou, China, 2005.
Vaske, Camilla
,
Mattias Weckstén
, and
Eric Jarpe
.
Velody — a novel method for music steganography
In
2017 3rd International Conference on Frontiers of Signal Processing (ICFSP)
. Paris, France, 2017.
Wu, Da-Chun
,
Chin-Yu Hsiang
, and
Ming-Yao Chen
.
"
Steganography via midi files by adjusting velocities of musical note sequences with monotonically non-increasing or non-decreasing pitches
."
IEEE Access
7 (2019): 154056-154075.
Yamamoto, Kotaro
, and
Munetoshi Iwakiri
.
A standard midi file steganography based on fluctuation of duration
In
2009 International Conference on Availability, Reliability and Security
. Fukuoka, Japan, 2009.
Wu, Da-Chun
, and
Ming-Yao Chen
.
"
Reversible data hiding in standard midi files by adjusting delta time values
."
Multimedia Tools and Applications
74, no. 21 (2015): 9827-9844.
Szczypiorski, Krzysztof
.
Stegibiza: New method for information hiding in club music
In
2016 2nd International Conference on Frontiers of Signal Processing (ICFSP)
., 2016.
Judge, James
.
Steganography: Past, present, future
In
Technical Report
., 2001.
Skúli, Sigurður
.
Classical piano composer
., 2019.
Pages
« първа
‹ предишна
…
422
423
424
425
426
427
428
429
430
…
следваща ›
последна »
469595 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all