Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Skúli, Sigurður
.
How to generate music using a lstm neural network in keras
., 2017.
How many stars are there in the universe?
. ESA, 2020.
Tarra, Hemanth
.
Understanding Processor (% Processor Time) and Process (%Processor Time)
. Microsoft TechNet Articles, 2012.
Fritchey, Grant
.
SQL Server 2017 Query Performance Tuning
In
Disk Performance Analysis
. Apress, 2017.
Muratore, Flavio
.
Windows Performance Monitor Disk Counters Explained
., 2012.
Alnatheer, Mohammed A.
.
"
Secure Socket Layer (SSL) Impact on Web Server Performance
."
Journal of Advances in Computer Networks
2, no. 3 (2014): 211-217.
Rosenberg, Jerry L.
.
"
Measuring and Monitoring NT Performance
." In
CMG Conference
., 2001.
Kara, Ilker
.
"
Detection, Technical Analysis and Solution of Teslacrypt Ransomware Virus
."
International Journal of Management Information Systems and Computer Science
2, no. 2 (2018): 87-94.
Dell Secureworks Counter Threat Unit Threat Intelligence
In
Threat Analysis report
. TeslaCrypt Ransomware, 2015.
Kurniawan, Ade
, and
Imam Riadi
.
"
Detection and Analysis Cerber Ransomware Based on Network Forensics Behavior
."
International Journal of Network Security
20, no. 5 (2018): 836-843.
Mohurle, Savita
, and
Manisha Patil
.
"
A brief study of Wannacry Threat: Ransomware Attack 2017
."
International Journal of Advanced Research in Computer Science
8, no. 5 (2017).
Scaife, Nolen
,
Henry Carter
,
Patrick Traynor
, and
Kevin R. B. Butler
.
"
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
." In
IEEE 36th International Conference on Distributed Computing Systems
., 2016.
Counter Threat Unit Research Team
.
Threat Analysis report on WannaCry
., 2017.
Olbrich, Christian
.
A Close Look at Ransomware by the Example of Vipasana
., 2016.
Chen, Victor C.
,
David Tahmoush
, and
William J. Miceli
.
Radar Micro-Doppler Signatures: Processing and applications
. The Institution of Engineering and Technology, 2014.
Tahmoush, David
.
"
Review of micro-Doppler signatures
."
IET Radar Sonar Navigation
9, no. 9 (2015): 1140-1146.
IVS-465
In
Technical data
. Experience and Reliability in Radar-Technology, 2020.
NI My RIO 1900
In
Technical data
. National Instruments, 2020.
The Internet Of Everything – Global Private Sector Economic Analysis
. Cisco, 2013.
Ghalwash, Atef Zaki
,
Nashaat El Khameesy
,
Dalia A. Magdi
, and
Amit Joshi
.
Internet of Things – Applications and Future
In
Proceedings of 2019, Lecture Notes in Networks and Systems book series 114
., 2019.
Vashi, Shivangi
,
Jyotsnamayee Ram
,
Janit Modi
,
Saurav Verma
, and
Chetana Prakash
.
"
Internet of Things (IoT) A Vision, Architectural Elements, and Security Issues
." In
International Conference on I-SMAC
., 2017.
Elhoseny, Mohamed
, and
Amit Kumar Singh
.
Smart Network Inspired Paradigm and Approaches in IoT Application
. Springer, 2019.
Ryoo, Jungwoo
,
Soyoung Kim
,
Junsung Cho
,
Hyoungshick Kim
,
Simon Tjoa
, and
Christopher DeRobertis
.
"
IoE Security Threats and You
." In
2017 International Conference on Software Security and Assurance (ICSSA)
. Altoona, PA, USA, 2017.
Harford, Tim
.
The man who got rich on data – years before Google
. BBC Article, 2020.
Facebook ad campaign helped Donald Trump win election, claims executive
. BBC, 2020.
Pages
« първа
‹ предишна
…
423
424
425
426
427
428
429
430
431
…
следваща ›
последна »
469596 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all