Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Jali, Mohd Zalisham
,
Shaharudin Ismail
, and
Zul Hilmi Abdullah
.
"
An Assessment on the Password Practices Among Students
."
Journal of Theoretical and Applied Information Technology
66, no. 3 (2014).
Cheng, Zi-Yao
,
Yun Liu
,
Chin-Chen Chang
, and
Shih-Chang Chang
.
An Improved Protocol for Password Authentication Using Smart Cards
., 2011.
Gaurav, Jayesh
,
Sanjive Tyagi
, and
Jayanthi Ranjan
.
"
Smart Card Fraud Prevention Scheme Using Fingerprinting Authentication
."
International Journal of Computer Science and Information Technologies
3, no. 1 (2012): 3059-3062.
Hadi, Raghad Mohammed
.
"
Security protocol for a remote user authentication system over unsecure network
."
Science articles exchange (مقالات العلوم الصرف)
18, no. 76 (2012).
Kumari, Anju
,
Deepti Tamhane
,
Komal Rani
, and
Ashwini Walunj
.
"
Credit Card Fraud Detection Using Biometric Fingerprint Authentication
."
IJSART
4, no. 12 (2018).
Ali, Muhammad Helmi
, and
Eddie Shahril Ismail
.
"
Password authentication scheme based on the quadratic residue problem
."
AIP Conference Proceedings
1830, no. 1 (2017).
Gaydarski, Ivan
, and
Zlatogor Minchev
.
Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2019.
Dang, Tran Khanh
.
"
Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
." In
Information Resources Management: Concepts, Methodologies, Tools and Applications
, 693-710. IGI Global, 2010.
Nguyen, Viet Hung
, and
Tran Khanh Dang
.
"
A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases
."
Journal of Software
3, no. 4 (2008).
Nguyen, Viet Hung
,
Tran Khanh Dang
,
Nguyen Thanh Son
, and
Josef Kung
.
"
Query Assurance Verification for Dynamic Outsourced XML Databases
." In
The Second International Conference on Availability, Reliability and Security (ARES'07)
. Vienna, Austria , 2007.
Wohlgemuth, Sven
,
Isao Echizen
, and
Noboru Sonehara
.
"
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking
."
Journal of Information Hiding and Multimedia Signal Processing
2, no. 3 (2011).
Dang, Tran Khanh
.
"
Security Issues in Outsourced XML Databases
." In
Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies
, 231-261. IGI Global, 2009.
Dang, Tran Khanh
, and
Nguyen Thanh Son
.
"
Providing Query Assurance for Outsourced Tree-Indexed Data
." In
Modeling, Simulation and Optimization of Complex Processes
. Berlin, Heidelberg: Springer, 2008.
Heurix, Johannes
, and
Thomas Neubauer
.
"
On the Security of Outsourced and Untrusted Databases
." In
IEEE/ACIS 9th International Conference on Computer and Information Science
. Yamagata, Japan , 2010.
Raybourn, Tracey
.
Bucketization Techniques for encrypted databases: Quantifying the impact of Query Distributions
In
Graduate College of Bowling Green State University
. Vol. Master of Science., 2013.
Zhang, Yong Hua
.
"
Anonymity Query Method of Outsourced Database
."
Advanced Materials Research
798-799 (2013): 837-841.
.W.T.Ngai, E
,
,
Y.H.Wong
,
, and
.
"
The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature
."
Decision Support Systems
50, no. 3 (2011): 559-569.
T.S.Quah, Jon
, and
M.Sriganesh
.
"
Real-time credit card fraud detection using computational intelligence
."
Expert Systems with Applications
35, no. 4 (2008): 1721-1732.
Van Vlasselaer, Véronique
,
Cristián Bravo
,
Olivier Caelen
,
Tina Eliassi-Rad
,
Leman Akoglu
,
Monique Snoeck
, and
Bart Baesens
.
"
APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions
."
Decision Support Systems
75 (2015): 38-48.
Delamaire, L.
,
HAH Abdou
, and
J. Pointon
.
"
Credit card fraud and detection techniques : a review
."
Banks and Bank Systems
4, no. 2 (2009): 57-68.
Abdallah, Aisha
,
Mohd Aizaini Maarof
, and
Anazida Zainal
.
"
Fraud detection system: A survey
."
Journal of Network and Computer Applications
68 (2016): 90-113.
Zareapoor, Masoumeh
,
K.R. Seeja
, and
M.Afshar.Alam
.
"
Analysis of Credit Card Fraud Detection Techniques: based on Certain Design Criteria
."
International Journal of Computer Applications (0975 – 8887)
52, no. 3 (2012).
Seeja, K. R.
, and
Masoumeh Zareapoor
.
"
FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
."
The Scientific World Journal
(2014).
Jans, Mieke
,
Nadine Lybaert
, and
Koen Vanhoof
.
"
A framework for Internal Fraud Risk Reduction at IT Integrating Business Processes: The IFR² Framework
."
International Journal of Digital Accounting Research
9 (2010).
Stahl, Frederic
, and
Ivan Jordanov
.
"
An overview of the use of neural networks for data mining tasks
."
WIREs Data Mining and Knowledge Discovery
2, no. 3 (2012): 193-208.
Pages
« първа
‹ предишна
…
347
348
349
350
351
352
353
354
355
…
следваща ›
последна »
384596 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all