Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Wu, Da-Chun, and Ming-Yao Chen. "Reversible data hiding in standard midi files by adjusting delta time values." Multimedia Tools and Applications 74, no. 21 (2015): 9827-9844. Szczypiorski, Krzysztof. Stegibiza: New method for information hiding in club music In 2016 2nd International Conference on Frontiers of Signal Processing (ICFSP)., 2016. Judge, James. Steganography: Past, present, future In Technical Report., 2001. Skúli, Sigurður. Classical piano composer., 2019. Skúli, Sigurður. How to generate music using a lstm neural network in keras., 2017. How many stars are there in the universe?. ESA, 2020. Tarra, Hemanth. Understanding Processor (% Processor Time) and Process (%Processor Time). Microsoft TechNet Articles, 2012. Fritchey, Grant. SQL Server 2017 Query Performance Tuning In Disk Performance Analysis. Apress, 2017. Muratore, Flavio. Windows Performance Monitor Disk Counters Explained., 2012. Alnatheer, Mohammed A.. "Secure Socket Layer (SSL) Impact on Web Server Performance." Journal of Advances in Computer Networks 2, no. 3 (2014): 211-217. Rosenberg, Jerry L.. "Measuring and Monitoring NT Performance." In CMG Conference., 2001. Kara, Ilker. "Detection, Technical Analysis and Solution of Teslacrypt Ransomware Virus." International Journal of Management Information Systems and Computer Science 2, no. 2 (2018): 87-94. Dell Secureworks Counter Threat Unit Threat Intelligence In Threat Analysis report. TeslaCrypt Ransomware, 2015. Kurniawan, Ade, and Imam Riadi. "Detection and Analysis Cerber Ransomware Based on Network Forensics Behavior." International Journal of Network Security 20, no. 5 (2018): 836-843. Mohurle, Savita, and Manisha Patil. "A brief study of Wannacry Threat: Ransomware Attack 2017." International Journal of Advanced Research in Computer Science 8, no. 5 (2017). Scaife, Nolen, Henry Carter, Patrick Traynor, and Kevin R. B. Butler. "CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data." In IEEE 36th International Conference on Distributed Computing Systems., 2016. Counter Threat Unit Research Team. Threat Analysis report on WannaCry., 2017. Olbrich, Christian. A Close Look at Ransomware by the Example of Vipasana., 2016. Chen, Victor C., David Tahmoush, and William J. Miceli. Radar Micro-Doppler Signatures: Processing and applications. The Institution of Engineering and Technology, 2014. Tahmoush, David. "Review of micro-Doppler signatures." IET Radar Sonar Navigation 9, no. 9 (2015): 1140-1146. IVS-465 In Technical data. Experience and Reliability in Radar-Technology, 2020. NI My RIO 1900 In Technical data. National Instruments, 2020. The Internet Of Everything – Global Private Sector Economic Analysis. Cisco, 2013. Ghalwash, Atef Zaki, Nashaat El Khameesy, Dalia A. Magdi, and Amit Joshi. Internet of Things – Applications and Future In Proceedings of 2019, Lecture Notes in Networks and Systems book series 114., 2019. Vashi, Shivangi, Jyotsnamayee Ram, Janit Modi, Saurav Verma, and Chetana Prakash. "Internet of Things (IoT) A Vision, Architectural Elements, and Security Issues." In International Conference on I-SMAC., 2017. Pages« първа ‹ предишна … 423 424 425 426 427 428 429 430 431 … следваща › последна »