Papers by Veselina Jecheva
КОМПЮТЪРНИ НАУКИ И КОМУНИКАЦИИ, Jun 15, 2019
Bookmarks Related papers MentionsView impact
КОМПЮТЪРНИ НАУКИ И КОМУНИКАЦИИ, 2016
Bookmarks Related papers MentionsView impact
ICERI Proceedings, 2020
Bookmarks Related papers MentionsView impact
Intrusion detection systems (IDS) protect the computer networks such as a burglar alarm system ag... more Intrusion detection systems (IDS) protect the computer networks such as a burglar alarm system against unauthorized access. The present paper introduces an approach to anomaly IDS based on Hidden Markov Models. The point is to process the sequences of system calls in order to distinguish the normal traces of system calls from abnormal ones. Simulations on Unix system data were accomplished and the results are represented as well.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
The present paper introduces some of the results of the project InnoPlatform, aimed at facilitati... more The present paper introduces some of the results of the project InnoPlatform, aimed at facilitating innovation and supporting the commercialisation of innovation in SMEs in Balkan-Mediterranean area with a focus on growth and internationalization. For achieving this purpose a network of Centres of Excellence in Innovation will be established as the knowledge and expertise holders providing advice and guidance to SMEs, consultants and public actors across the region. In addition, a series of practical innovation tools, services, and guidelines to support the innovation capacity of SMEs in the region, will be designed and developed.
Bookmarks Related papers MentionsView impact
2015 8th International Conference on Database Theory and Application (DTA), 2015
The present paper introduces some applications of clustering methodology, namely FLAME algorithm ... more The present paper introduces some applications of clustering methodology, namely FLAME algorithm to the behavioral analysis of the user activities, performed by a host-based intrusion detection system. The normal and anomalous activity patterns are distinguished by 2-means clustering algorithm and separated into two non-intersecting clusters. The results of the performed simulation experiments are represented as well.
Bookmarks Related papers MentionsView impact
ICERI2019 Proceedings, 2019
Bookmarks Related papers MentionsView impact
Lecture Notes in Networks and Systems
Bookmarks Related papers MentionsView impact
Journal of Information Organization
Bookmarks Related papers MentionsView impact
Open Journal of Information Security and Applications, 2014
Bookmarks Related papers MentionsView impact
International Journal of Security and Its Applications, 2016
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Engineering the Computer Science and IT, 2009
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
ABSTRACT
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Uploads
Papers by Veselina Jecheva