Vesselin Petkov IntroductionShort CV(active tab)Full profilePublicationsShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Bengio, Yoshua. "Learning Deep Architectures for AI." Foundations and Trends® in Machine Learning 2, no. 1 (2009). Schmidhuber, Juergen. "Deep Learning in Neural Networks: An Overview." Neural Networks 61 (2015): 85-117. Ester, Martin, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu, Evangelos Simoudis, Jiawei Han, and Usama Fayyad. A density-based algorithm for discovering clusters in large spatial databases with noise In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96)., 1996. Petrov, Pavel, Georgi Dimitrov, and Svetoslav Ivanov. Comparative Study on WebSecurity Technologies UsedinIrish and FinnishBanks In 18 International MultidisciplinaryScientificGeoconference SGEM 2018. Vol. 18. Albena, Bulgaria, 2018. Petrov, Pavel, Stefan Krumovich, Nikola Nikolov, Georgi Dimitrov, and Vladimir Sulov. Web Technologies Used in the Commercial Banks in Finland In 19th International Conference on Computer Systems and Technologies (CompSys-Tech'18). New York, NY, USA, 2018. The Global State of Information Security® Survey 2018(link is external). Official site PricewaterhouseCoopers - Access Mode, 2018. Shevchenko, Viktor, Alina Shevchenko, Ruslan Fedorenko, Yurii Shmorhun, and Asadi Hrebennikov. "Designing of Functionally Stable Information Systems Optimal for a Minimum of Losses - CADSM 2019." In 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM). Polyana-Svalyava (Zakarpattya), UKRAINE, IEEE Ukraine Section, IEEE Ukraine Section (West), 2019. Shevchenko, Viktor, and Alina Shevchenko. The Epidemiological Approach to Information Security Incidents Forecasting for Decision Making Systems In 13-th International Conference Perspective Technologies and Methods in MEMS Design (MEMSTECH). Polyana, UKRAINE, 2017. Shevchenko, Viktor, O.V.Nesterenko, I.E. Netesin, Alina Shevchenko, and V.B. Polishchuk. Prognostic modeling of computer virus epidemics In K.: UkrSC IND., 2019. Weir, Matt. Hacking 400,000 passwords, or explaining to a roommate why your electricity bill went up(link is external). Defcon 17, 2017. Diffie, Whitfield, and Martin E. Hellman. "New Direction in Cryptography." IEEE Transaction on Information Theory IT 22, no. 6 (1976): 644-654. Diffie-Hellman Protocol(link is external). Wikipedia Website, 2020. Mukhachev, V.A., and V.A. Khoroshko. Methods of practical cryptography. Kyiv, Ukraine: OOO Poligraf-Consulting, 2005. Bilan, Stepan. Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators: Emerging Research and Opportunities (link is external). USA: IGI Global, 2017. Hawking, Stephen, and Leonard Mlodinow. The Grand Design. New York, NY, USA: Bantam Books, 2010. Heppenstall, Alison, Linda See, Khalid Al-Ahmadi, and Bokhwan Kim. "CA City: Simulating Urban Growth through the Application of Cellular Automata." In Cellular Automata: Simplicity Behind Complexity, 87-104. Intech Open, 2011. Jafelice, Rosana Matta, and Patricia Nunes da Silva. "Studies on Population Dynamics Using Cellular Automata." In Cellular Automata: Simplicity Behind Complexity, 105-130., 2011. Astaf'ev, G.B., A. A.Koronovsky, and A. E. Khramov. Cellular automaton: A manual . Saratov: State University Publishing House "College", 2003. Salcido, Alejandro. "Equilibrium Properties of the Cellular Automata Models for Traffic Flow in a Single Lane." In Cellular Automata: Simplicity Behind Complexity, 159-192. Intech Open, 2011. Oliinnikov, R.V.. "Kupin's hashing function is the new national standard of Ukraine." Radio Engineering 181 (2015): 23-30. DSTU 7564: 2014, Cryptographic protection of information, Hashing function In Information Technology. Kiev: Ministry of Economic Development of Ukraine, 2015. Salcido, Alejandro. Cellular Automata: Simplicity Behind Complexity . Intech Open, 2011. Antonov, Petar, and Simeon Malchev. Kriptografia v komputarnite mrezhi . Varna: TU , 2000. Antonov, Petar. Naruchnik po criptographia i zashtita na dannite. TU Varna, 2014. Antonov, Petar, and Valentina Аntonova. Analiz na sigurnosta na parolnite frazi In Konferentsiya na tema „Politikata na Evropeĭskiya sŭyuz po zashtitata na informatsiyata i lichnite danni". Shumen: Natsionalen voenen universitet ―Vasil Levski , 2018. Pages« първа ‹ предишна … 442 443 444 445 446 447 448 449 450 … следваща › последна »