Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Buriro, Attaullah, Bruno Crispo, Filippo Frari, and Konrad Wrona. "Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics." In New Trends in Image Analysis and Processing − ICIAP 2015 Workshops. Cham: Springer, 2015. Buriro, Attaullah, Bruno Crispo, Filippo Delfrari, and Konrad Wrona. Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication In Proceedings of the Mobile Security Technologies Workshop (MOST), in conjunction with 37th IEEE Symposium on Security and Privacy. San Jose, CA, 2016. Desolneux, Agnes, Lionel Moisan, and Jean-Michel Morel. "The Helmholtz Principle." In From Gestalt Theory to Image Analysis, Interdisciplinary Applied Mathematics, 31-45. Vol. 34 . Springer, 2008. Balinsky, Alexander, Helen Balinsky, and Steven Simske. On the Helmholtz Principle for Data Mining In Technical report. HP Laboratories, 2010. Balinsky, Alexander, Helen Balinsky, and Steven Simske. Rapid Change Detection and Text Mining In Proceedings of the 2nd IMA Conference on Mathematics in Defence. Swindon, UK: Defence Academy of the United Kingdom, 2011. Wrona, Konrad, Sander Oudkerk, Alessandro Armando, Silvio Ranise, and Lisa Ferrari. Assisted Content-based Labelling and Classification of Documents In Proceedings of the International Conference on Military Communications and Information System (ICMCIS)., 2016. NATO, Cyber defence., 2016. NATO, Emerging Security Challenges Division., 2016. NATO, Cooperative Cyber Defence Centre of Excellence., 2016. NATO, Allied Command Transformation., 2016. NATO Headquarters., 2016. NATO Communications and Information Agency., 2016. NATO, COI Cooperation Portal., 2016. Sidoran, James. Information Assurance/Cyber Defence Research Framework In Technical Report. Paris: NATO Science and Technology Organization, 2014. NATO Security Investment Programme., 2016. NATO Basic Ordering Agreement Orders (BOA)., 2016. Le Beau, John J.. "New Blood: The Recruitment of Terrorists." In The Dangerous Landscape, 1-18., 2013. Gohel, Sajjan. "Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom." In The Dangerous Landscape, 19-36., 2013. Antoliš, Krunoslav. "Internet Forensics and Combating Terrorism." In The Dangerous Landscape, 37-45., 2013. Perl, Raphael, and Nemanja Malisevic. "A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward." In The Dangerous Landscape, 47-61., 2013. Bockstette, Carsten. "After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers." In The Dangerous Landscape, 63-77., 2013. Forster, Peter K.. "Terrorist Innovation: Homegrown Terrorism and the Internet." In The Dangerous Landscape, 79-86., 2013. Feiler, Michael. "Islamic Extremism – Analyzing the Risks." In The Dangerous Landscape, 87-97., 2013. Le Beau, John J.. "Foreword." In The Dangerous Landscape., 2013. Arasli, Jahangir E.. "Violent Converts to Islam: Growing Cluster and Rising Trend." In The Dangerous Landscape, 99-121., 2013. Pages« първа ‹ предишна … 212 213 214 215 216 217 218 219 220 … следваща › последна »