Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Antonov, Petar, Valentina Аntonova, and D. Razsadov. An approach and a software system of choosing reliable password phrases for resource access control In "TEHNONAV 2002". Constanta (Romania): Ovidius University Press, 2002. Antonov, Petar, and Valentina Аntonova. Access Control in the Virtual Education Area In Fourth Intern. Bulgarian-Greek Conf. Computer Science’08. Kavala, Greece, 2008. Bonneau, Joseph. Deep Dive: EFF’s New Wordlists for Random Passphrases. Electronic Frontier Foundation, 2016. Diceware™ Randomized Word Lists (Bulgarian): Diceware Randomized Word., 2020. Grassi, Paul A.. Digital Identity Guidelines. Authentication and Lifecycle Management In Special Publication. Department of Commerce, NIST, 2017. Reinhold, Arnold G.. The Diceware Passphrase Home Page., 2020. The Diceware Passphrase FAQ., 2020. van Steen, Maarten, and Andrew S. Tanenbaum. "A Brief Introduction to Distributed Systems." Computing 98 (2016): 967-1009. Kumar, Ashok, and Venugopalan Srinivasag Rajan. "Intrusion Detection Systems: A Review." An International Journal of Advanced Research in Computer Science 8, no. 8 (2017): 356-370. Joyce, Jeffrey, Greg Lomow, Konrad Slind, and Brian Unger. "Monitoring Distributed Systems." An ACM Transactions on Computer Systems 5, no. 2 (1987): 121-150. Behal, Sunny, and Krishan Kumar. "Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review." International Journal of Network Security 19, no. 3 (2017): 383-393. Bikbulatov, Timur, and Ilya Kurochkin. "Simulation of DDoS attack on software defined networks." AIP Conference Proceedings 2181, no. 1 (2019): 020022. Joshi, Manish, and Theyazn Hassn Hadi. "A review of network traffic analysis and prediction techniques." arXiv preprint arXiv (2015): 1507.05722. MongoDB., 2020. Lytvynov, Vitalii, Mariia Dorosh, Iryna Bilous, Mariia Voitsekhovska, and Valentyn Nekhai. "Development of the automated information system for organization’s information security culture level assessment." Technical sciences and technologie 1, no. 19 (2020): 124-32. CyRADARS Cyber Rapid Analysis for Defense Awareness of Real-Time Situation., 2020. Number of smartphones sold to end users worldwide from 2007 to 2020., 2020. Top 7 Mobile Security Threats in 2020., 2020. Bellardo, John, and Stefan Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. San Diego: Department of Computer Science and Engineering, University of California, 2020. ESP8266 Introduction., 2020. esp8266_deauther., 2020. Semtech: AN1200.22 - LoRa Modulation Basics ., 2015. Semtech: SX1276/77/78/79 Datasheet ., 2016. Semtech: AN1200.13 - SX1272/3/6/7/8 LoRa Modem Design Guide., 2013. LoRaWAN specification. LoRa Alliance, 2018. Pages« първа ‹ предишна … 443 444 445 446 447 448 449 450 451 … следваща › последна »