Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Bridges, Robert
,
Tarrah Glass-Vanderlan
,
Michael Iannacone
,
Maria Vincent
, and
Qian Chen
.
"
Survey of Intrusion Detection Systems Leveraging Host Data
."
ACM Comput. Surv.
52, no. 6 (2020).
Zhao, Hao
,
Yaokai Feng
,
Hiroshi Koide
, and
Kouichi Sakurai
.
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS
In
Seventh International Symposium on Computing and Networking (CANDAR)
. Nagasaki, Japan, 2017.
Yeo, Liu Hua
,
Xiangdong Che
, and
Shalini Lakkaraju
.
"
Understanding Modern Intrusion Detection Systems: A Survey
."
arXiv:1708.07174
(2017).
Liao, Hung-Jen
,
Chun-Hung Richard Lin
,
Ying -Chih
, and
Kuang-Yuan Tung
.
"
Review: Intrusion detection system: A comprehensive review
."
Journal of Network and Computer Applications
(2013).
"
Kubernetes scalability and performance SLIs/SLOs
."
GitHub
(2020).
Sharkov, George
,
Yavor Papazov
,
Christina Todorova
,
Georgi Koykov
,
Martin Georgiev
, and
Georgi Zahariev
.
Cyber Threat Map for National and Sectoral Analysis
In
Computer and Communications Engineering, Workshop on Information Security 2019, 9th Balkan Conference in Informatics
., 2019.
Ojagbule, Olajide
,
Hayden Wimmer
, and
Rami J. Haddad
.
"
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
." In
IEEE, SoutheastCon 2018
. St. Petersburg, FL, USA, 2018.
Nissen, Christopher A.
,
John E. Gronager
,
Robert S. Metzger
,
Rogers Joseph O’Donnell
, and
Harvey Rishikof
.
Deliver Uncompromised: A Strategy for Supply Chain Security and Resilience
. Washington, DC: MITRE, 2019.
Schauer, Stefan
,
Martin Stamer
,
Claudia Bosse
,
Michalis Pavlidis
,
Haralambos Mouratidis
,
Sandra König
, and
Spyros Papastergiou
.
An Adaptive Supply Chain Cyber Risk Management Methodology
In
Hamburg International Conference on Logistics, Project: MITIGATE
., 2017.
Hausken, Kjell
, and
Gregory Levitin
.
"
Review of systems defense and attack models
."
International Journal of Performability Engineering
8, no. 4 (2012): 355-366.
Cooke, Nancy
,
Michael Champion
,
Prashanth Rajivan
, and
S. Jariwala
.
"
Cyber Situation Awareness and Teamwork
."
EAI Endorsed Transactions on Security and Safety
1, no. 13 (2013).
Gupta, Maanak
,
Mahmoud Abdelsalam
,
Sajad Khorsandroo
, and
Sudip Mittal
.
"
Security and Privacy in Smart Farming: Challenges and Opportunities
."
IEEE Access
8 (2020): 1-21.
McGuinness,.
, and
L. Foy
.
A Subjective Measure of SA: The Crew Awareness Rating Scale (CARS)
In
First Human Performance, Situation Awareness and Automation Conference
. Savannah, Georgia, 2000.
Onwubiko, Cyril
, and
Thomas Owens
.
"
Review of Situational Awareness for Computer Network Defense
." In
Situational Awareness in Computer Network Defense: Principles, Methods and Applications
. International Science Reference, 2011.
Popper, Karl
.
Conjectures and Refutations: The Growth of Scientific Knowledge
. London: Routledge Classics, 2009.
Ilves, Luukas
,
Timothy Evans
,
Frank Cilluffo
, and
Alec Nadeau
.
"
European Union and NATO Global Cybersecurity Challenges: A Way Forward
."
PRISM
6, no. 2 (2016).
Simola, Jussi
, and
Martti J. Lehto
.
National Cyber Threat Prevention Mechanism as a part of the E-EWS
In
International Conference on Cyber Warfare and Security
., 2020.
Simola, Jussi
.
"
Comparative Research of Cybersecurity Information Sharing Models: The Common Cyber Ecosystem of ECHO
." In
Digital Transformation, Cyber Security and Resilience (DIGILIENCE 2019)
. Sofia, 2019.
DPIA pre-assessment Report, v0.2
. ECHO, 2019.
Henriksen-Bulmer, Jane
.
Incorporating contextual integrity into privacy decision making: a risk based approach
. Bournemouth University, 2019.
Franke, Ulrik
, and
Joel Brynielsson
.
"
Cyber situational awareness - A systematic review of the literature
."
Computers & Security
46 (2014): 18-31.
Endsley, Mica
.
"
Design and Evaluation for Situation Awareness Enhancement
."
Human Factors Society Annual Meeting
32, no. 2 (1988): 97-101.
Chertov, Oleg
,
Taras Rudnyk
, and
Oleksandr Palchenko
.
Search of phony accounts on Facebook. Ukrainian case
In
International Conference on Military Communications and Information Systems (ICMCIS2018)
. Warsaw, Poland: IEEE Xplore, 2018.
Let, V. V.
, and
I.S. Skitter
.
Determination of non-standard behavior of the network by methods of statistical analysis
In
Thirteenth International Scientific and Practical Conference "Mathematical and Simu-lation Modeling of Systems MODS 2018"
. Chernihiv-Kiev-Zhukin, 2018.
Skiter, I. S.
.
Methods of forming an image of a normal computer behavior Networks
In
III International Conference "Problems of Decommissioning of Objects nuclear energy and the restoration of the environment," INUDECO
. Slavutych, 2018.
Pages
« първа
‹ предишна
…
431
432
433
434
435
436
437
438
439
…
следваща ›
последна »
469543 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all