Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Kokkonen, Tero. "Anomaly-Based Online Intrusion Detection System as a Senor for Cyber Security Situational Awareness System." Jyväskylä studies in computing, University of Jyväskylä 251 (2016). Rajamäki, Jyri, and Rauno Pirinen. Towards the cyber security paradigm of eHealth: Resilience and design aspects In Proceedings of the 1st International Conference on Applied Mathematics and Computer Science. Vol. 1836. Melville: AIP Publishing, 2017. FortiWeb 5.7.1 Administration Guide: Solutions for specific web attacks. Fortine, 2020. Internet Security Threat Report. Vol. 24. Symantec, 2019. Stetsenko, Inna V., and Vitalii Lytvynov. "Computer Virus Propagation Petri-Object Simulation." In Advances in Intelligent Systems and Computing 1019, 103-112. Cham: Springer, 2020. Web Applications vulnerabilities and threats: statistics for 2019. Positive Technologies, 2020. Axelsson, Stefan. Intrusion Detection Systems: A Survey and Taxonomy., 2020. Stoianov, Nicolai, Vitalii Lytvynov, Igor Skiter, and Svitlana Lytvyn. "Traffic Abnormalities Identification Based on the Stationary Parameters Estimation and Wavelet Function Detailization." In Advances in Intelligent Systems and Computing 1019, 83-95. Cham: Springer, 2020. Hindy, Hanan, Elike Hodo, Ethan Bayne, Amar Seeam, Robert Atkinson, and Xavier Bellekens. A Taxonomy of Malicious Traffic for Intrusion Detection Systems In 2018 IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA). Glasgow, UK., 2018. Khraisat, Ansam, Iqbal Gondal, Peter Vamplew, and Joarder Kamruzzaman. "Survey of intrusion detection systems: techniques, datasets and challenges." Cybersecurity 2 (2019). Attack Signatures. Broadcom, 2020. Dong, Ying, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, and Wenjie Wang. "An adaptive system for detecting malicious queries in web attacks." Science China Information Sciences 61 (2018). "Evading IDS, Firewalls and Detecting Honeypots." In Ethical hacking and countermeasures: Secure Network Operating Systems and Infrastructures, 77-134. Second ed. Boston, USA: Cengage Learning, 2016. Day, David J., Denys A. Flores, and Harjinder Singh Lallie. CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK: TrustCom , 2012. Gupta, Megha. "Hybrid Intrusion Detection System: Technology and Development." International Journal of Computer Applications 115, no. 9 (2015): 5-8. Man in the middle (MITM) attack. Imperva, 2020. Smith, Bryant. Advanced Malware Detection with Suricata Lua Scripting. Trustwave, 2017. Understanding Heuristic-based Scanning vs. Sandboxing. Opswat, 2015. Milenkoski, Aleksandr, Varco Vieira, Samuel Kounev, Alberto Avritzer, and Bryan D. Payne. "Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices." ACM Computing surveys 48, no. 1 (2015): 1-41. Burmaka, Ivan, Nicolai Stoianov, Vitalii Lytvynov, Mariia Dorosh, and Svitlana Lytvyn. "Proof of Stake for Blockchain Based Distributed Intrusion Detecting System." In Advances in Intelligent Systems and Computing 1265, 237-247. Cham: Springer, 2021. Djebbar, Fatiha, Beghdad Ayad, Karim Abed Meraim, and Habib Hamam. "Comparative study of digital audio steganography techniques." EURASIP Journal on Audio, Speech, and Music Processing 1 (2012): 25. Adli, A., and Z. Nakao. Three steganography algorithms for midi files In 2005 International Conference on Machine Learning and Cybernetics. Vol. 4. Guangzhou, China, 2005. Vaske, Camilla, Mattias Weckstén, and Eric Jarpe. Velody — a novel method for music steganography In 2017 3rd International Conference on Frontiers of Signal Processing (ICFSP). Paris, France, 2017. Wu, Da-Chun, Chin-Yu Hsiang, and Ming-Yao Chen. "Steganography via midi files by adjusting velocities of musical note sequences with monotonically non-increasing or non-decreasing pitches." IEEE Access 7 (2019): 154056-154075. Yamamoto, Kotaro, and Munetoshi Iwakiri. A standard midi file steganography based on fluctuation of duration In 2009 International Conference on Availability, Reliability and Security. Fukuoka, Japan, 2009. Pages« първа ‹ предишна … 422 423 424 425 426 427 428 429 430 … следваща › последна »