Vesselin Petkov

Introduction

Short CV

insert short SV here

Full profile

This is the longer CV, presenting education, work experience, etc.

Publications
Bengio, Yoshua. "Learning Deep Architectures for AI." Foundations and Trends® in Machine Learning 2, no. 1 (2009).
Ester, Martin, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu, Evangelos Simoudis, Jiawei Han, and Usama Fayyad. A density-based algorithm for discovering clusters in large spatial databases with noise In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96)., 1996.
Petrov, Pavel, Georgi Dimitrov, and Svetoslav Ivanov. Comparative Study on WebSecurity Technologies UsedinIrish and FinnishBanks In 18 International MultidisciplinaryScientificGeoconference SGEM 2018. Vol. 18. Albena, Bulgaria, 2018.
Petrov, Pavel, Stefan Krumovich, Nikola Nikolov, Georgi Dimitrov, and Vladimir Sulov. Web Technologies Used in the Commercial Banks in Finland In 19th International Conference on Computer Systems and Technologies (CompSys-Tech'18). New York, NY, USA, 2018.
The Global State of Information Security® Survey 2018(link is external). Official site PricewaterhouseCoopers - Access Mode, 2018.
Shevchenko, Viktor, Alina Shevchenko, Ruslan Fedorenko, Yurii Shmorhun, and Asadi Hrebennikov. "Designing of Functionally Stable Information Systems Optimal for a Minimum of Losses - CADSM 2019." In 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM). Polyana-Svalyava (Zakarpattya), UKRAINE, IEEE Ukraine Section, IEEE Ukraine Section (West), 2019.
Shevchenko, Viktor, and Alina Shevchenko. The Epidemiological Approach to Information Security Incidents Forecasting for Decision Making Systems In 13-th International Conference Perspective Technologies and Methods in MEMS Design (MEMSTECH). Polyana, UKRAINE, 2017.
Diffie, Whitfield, and Martin E. Hellman. "New Direction in Cryptography." IEEE Transaction on Information Theory IT 22, no. 6 (1976): 644-654.
Diffie-Hellman Protocol(link is external). Wikipedia Website, 2020.
Mukhachev, V.A., and V.A. Khoroshko. Methods of practical cryptography. Kyiv, Ukraine: OOO Poligraf-Consulting, 2005.
Hawking, Stephen, and Leonard Mlodinow. The Grand Design. New York, NY, USA: Bantam Books, 2010.
Heppenstall, Alison, Linda See, Khalid Al-Ahmadi, and Bokhwan Kim. "CA City: Simulating Urban Growth through the Application of Cellular Automata." In Cellular Automata: Simplicity Behind Complexity, 87-104. Intech Open, 2011.
Jafelice, Rosana Matta, and Patricia Nunes da Silva. "Studies on Population Dynamics Using Cellular Automata." In Cellular Automata: Simplicity Behind Complexity, 105-130., 2011.
Astaf'ev, G.B., A. A.Koronovsky, and A. E. Khramov. Cellular automaton: A manual . Saratov: State University Publishing House "College", 2003.
Salcido, Alejandro. "Equilibrium Properties of the Cellular Automata Models for Traffic Flow in a Single Lane." In Cellular Automata: Simplicity Behind Complexity, 159-192. Intech Open, 2011.
DSTU 7564: 2014, Cryptographic protection of information, Hashing function In Information Technology. Kiev: Ministry of Economic Development of Ukraine, 2015.
Antonov, Petar, and Valentina Аntonova. Analiz na sigurnosta na parolnite frazi In Konferentsiya na tema „Politikata na Evropeĭskiya sŭyuz po zashtitata na informatsiyata i lichnite danni". Shumen: Natsionalen voenen universitet ―Vasil Levski , 2018.

Pages