Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Endsley, Mica. "Design and Evaluation for Situation Awareness Enhancement." Human Factors Society Annual Meeting 32, no. 2 (1988): 97-101. Chertov, Oleg, Taras Rudnyk, and Oleksandr Palchenko. Search of phony accounts on Facebook. Ukrainian case In International Conference on Military Communications and Information Systems (ICMCIS2018). Warsaw, Poland: IEEE Xplore, 2018. Let, V. V., and I.S. Skitter. Determination of non-standard behavior of the network by methods of statistical analysis In Thirteenth International Scientific and Practical Conference "Mathematical and Simu-lation Modeling of Systems MODS 2018". Chernihiv-Kiev-Zhukin, 2018. Skiter, I. S.. Methods of forming an image of a normal computer behavior Networks In III International Conference "Problems of Decommissioning of Objects nuclear energy and the restoration of the environment," INUDECO. Slavutych, 2018. Smola, Alex, and S.V.N. Vishwanathan. Introduction to Machine Learning. Cambridge University Press, 2008. Wlodarczak, Peter. Machine Learning and its Applications. CRC Press, 2019. Gros, Xavier. NDT Data Fusion. Great Britain: Amold, 1997. Stoianov, Nikolai, and Maya Bozhilova. "Expert’s study on situational awareness of operations directed at the wide dissemination of malicious information." In Conference Proceedings, MODS2020. Chernihiv, Ukraine, 2020. Chen, Qi, Amanda Whitbrook, Uwe Aickelin, and Chris Roadknight. "Data classification using the Dempster–Shafer method." Journal of Experimental & Theoretical Artificial Intelligence 26, no. 4 (2014): 493-517. Gordon, Jean, and Edward H. Shortliffe. The Dempster-Shafer theory of evidence. Readings in uncertain reasoning . San Francisco, CA, USA: Morgan Kaufmann Publishers, 1990. Zheng, Weifa. Research on situation awareness of network security assessment based on dempster-shafer In 2019 International Conference on Computer Science Communication and Network Security (CSCNS2019). Vol. 309. MATEC Web of Conferences, 2020. Chen, Gang, Jun Ping Cai, and Jun Yang. "Network Security Situation Awareness Based on Multi-source Data Fusion." Advanced Materials Research 989-994 (2014): 4885-4888. The CyRADARS web site., 2020. Proactive detection of security incidents II – Honeypots. ENISA, 2012. NATO Science for Peace and Security Programme Homepage., 2020. Wardle, Claire, and Hossein Derakhshan. Council of Europe’s Information Disorder Report: Toward an interdisciplinary framework for research and policymaking. 2nd revised edition., 2018. Glastopf., 2020. Dionaea., 2020. EUvsDisinfo., 2020. Shafie, Ana, Nurfadhlina Sharef, Masrah Murad, and Azreen Azman. "Aspect Extraction Performance With POS Tag Pattern of Dependency Relation in Aspect-based Sentiment Analysis." In 2018 Fourth International Conference on Information Retrieval and Knowledge Management (CAMP). Kota Kinabalu, Malaysia, 2018. Berthold, Michael, Nicolas Cebron, Fabian Dill, Thomas Gabriel, Tobias Kötter, Thorsten Meinl, Peter Ohl, Christoph Sieb, Kilian Thiel, and Bernd Wiswedel. "KNIME: The Konstanz Information Miner." In Data Analysis, Machine Learning and Applications; Studies in Classification, Data Analysis, and Knowledge Organization. Springer, 2007. Mestric, Ivana Ilic, Arvid Kok, Giavid Valiyev, and Michael Street. Technical Report: Exploration of NATO Exercise Big Data for Lessons Learned. The Hague: NCI Agency, 2019. Stanford Coreference resolution., 2020. Stanford CorefAnnotater., 2020. Jurafsky, Daniel, and James Martin. Speech and Language Processing., 2019. Pages« първа ‹ предишна … 432 433 434 435 436 437 438 439 440 … следваща › последна »