Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
The Global State of Information Security® Survey 2018
. Official site PricewaterhouseCoopers - Access Mode, 2018.
Shevchenko, Viktor
,
Alina Shevchenko
,
Ruslan Fedorenko
,
Yurii Shmorhun
, and
Asadi Hrebennikov
.
"
Designing of Functionally Stable Information Systems Optimal for a Minimum of Losses - CADSM 2019
." In
15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)
. Polyana-Svalyava (Zakarpattya), UKRAINE, IEEE Ukraine Section, IEEE Ukraine Section (West), 2019.
Shevchenko, Viktor
, and
Alina Shevchenko
.
The Epidemiological Approach to Information Security Incidents Forecasting for Decision Making Systems
In
13-th International Conference Perspective Technologies and Methods in MEMS Design (MEMSTECH)
. Polyana, UKRAINE, 2017.
Shevchenko, Viktor
,
O.V.Nesterenko
,
I.E. Netesin
,
Alina Shevchenko
, and
V.B. Polishchuk
.
Prognostic modeling of computer virus epidemics
In
K.: UkrSC IND
., 2019.
Weir, Matt
.
Hacking 400,000 passwords, or explaining to a roommate why your electricity bill went up
. Defcon 17, 2017.
Diffie, Whitfield
, and
Martin E. Hellman
.
"
New Direction in Cryptography
."
IEEE Transaction on Information Theory IT
22, no. 6 (1976): 644-654.
Diffie-Hellman Protocol
. Wikipedia Website, 2020.
Mukhachev, V.A.
, and
V.A. Khoroshko
.
Methods of practical cryptography
. Kyiv, Ukraine: OOO Poligraf-Consulting, 2005.
Bilan, Stepan
.
Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators: Emerging Research and Opportunities
. USA: IGI Global, 2017.
Hawking, Stephen
, and
Leonard Mlodinow
.
The Grand Design
. New York, NY, USA: Bantam Books, 2010.
Heppenstall, Alison
,
Linda See
,
Khalid Al-Ahmadi
, and
Bokhwan Kim
.
"
CA City: Simulating Urban Growth through the Application of Cellular Automata
." In
Cellular Automata: Simplicity Behind Complexity
, 87-104. Intech Open, 2011.
Jafelice, Rosana Matta
, and
Patricia Nunes da Silva
.
"
Studies on Population Dynamics Using Cellular Automata
." In
Cellular Automata: Simplicity Behind Complexity
, 105-130., 2011.
Astaf'ev, G.B.
,
A. A.Koronovsky
, and
A. E. Khramov
.
Cellular automaton: A manual
. Saratov: State University Publishing House "College", 2003.
Salcido, Alejandro
.
"
Equilibrium Properties of the Cellular Automata Models for Traffic Flow in a Single Lane
." In
Cellular Automata: Simplicity Behind Complexity
, 159-192. Intech Open, 2011.
Oliinnikov, R.V.
.
"
Kupin's hashing function is the new national standard of Ukraine
."
Radio Engineering
181 (2015): 23-30.
DSTU 7564: 2014, Cryptographic protection of information, Hashing function
In
Information Technology
. Kiev: Ministry of Economic Development of Ukraine, 2015.
Salcido, Alejandro
.
Cellular Automata: Simplicity Behind Complexity
. Intech Open, 2011.
Antonov, Petar
, and
Simeon Malchev
.
Kriptografia v komputarnite mrezhi
. Varna: TU , 2000.
Antonov, Petar
.
Naruchnik po criptographia i zashtita na dannite
. TU Varna, 2014.
Antonov, Petar
, and
Valentina Аntonova
.
Analiz na sigurnosta na parolnite frazi
In
Konferentsiya na tema „Politikata na Evropeĭskiya sŭyuz po zashtitata na informatsiyata i lichnite danni"
. Shumen: Natsionalen voenen universitet ―Vasil Levski , 2018.
Antonov, Petar
,
Valentina Аntonova
, and
D. Razsadov
.
An approach and a software system of choosing reliable password phrases for resource access control
In
"TEHNONAV 2002"
. Constanta (Romania): Ovidius University Press, 2002.
Antonov, Petar
, and
Valentina Аntonova
.
Access Control in the Virtual Education Area
In
Fourth Intern. Bulgarian-Greek Conf. Computer Science’08
. Kavala, Greece, 2008.
Bonneau, Joseph
.
Deep Dive: EFF’s New Wordlists for Random Passphrases
. Electronic Frontier Foundation, 2016.
Diceware™ Randomized Word Lists (Bulgarian): Diceware Randomized Word
., 2020.
Grassi, Paul A.
.
Digital Identity Guidelines. Authentication and Lifecycle Management
In
Special Publication
. Department of Commerce, NIST, 2017.
Pages
« първа
‹ предишна
…
442
443
444
445
446
447
448
449
450
…
следваща ›
последна »
347939 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all