Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Uzunova-Dimitrova, B., Zhelezov, S., (2024), Application of the One-Parameter Rasch Model to Quality Education Through Evaluation and Survey Analysis, TEM Journal 13(3), pp. 2534-2543. (Scopus Q3, WoS Q4), DOI 10.18421/TEM133-79 |
30.10.2024 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Uzunova-Dimitrova, B., Paraskevov, H., & Zhelezov, S. (2023). Objective Assessment During a Pandemic. TEM Journal, 12(1). (Scopus Q3, WoS Q4) |
30.10.2024 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| S. Zhelezov, K. Kordov, A. Nachev and D. Pavlova, \"Spread Spectrum Steganography In Audio Containers,\" 2023 5th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), Lipetsk, Russian Federation, 2023, pp. 568-571, doi: 10.1109/SUMMA60232.2023.10349403. (Scopus) |
14.10.2024 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| A. Nachev, D. Pavlova, S. Zhelezov, K. Kordov and P. Gindev, \"Execution Of Information Processes Subjected To The Influence Of Two Types Of Disturbing Effects With Different Probability Characteristics,\" 2023 5th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), Lipetsk, Russian Federation, 2023, pp. 572-574, doi: 10.1109/SUMMA60232.2023.10349535. (Scopus) |
14.10.2024 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Zhelezov, S., Kordov, K., Nachev, A., Stoyanova, T., Uzunova-Dimitrova, B., & Pavlova, D. (2021). Study of the Efficiency Coefficient of the Steganographic Embedding in Text Containers Using the Letter Replacement Method. In 2021 3rd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), pp. 680-684, IEEE. (Scopus) |
01.09.2023 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Kordov, K., Zhelezov, S., Nachev, A., Gueorguiev, N., & Pavlova, D. (2021). Design of Digital Image Encryption Scheme With Cryptographic Analysis. In 2021 3rd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), pp. 685-692, IEEE. (Scopus) |
01.09.2023 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Nachev, A., Kordov, K., Zhelezov, S., Gueorguiev, N., & Pavlova, D. (2021). Influence of Two Types of Disturbing Effects with Different Statistical Characteristics on the Efficiency of Information Processes Implementation. In 2021 3rd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), pp. 693-695, IEEE. (Scopus) |
01.09.2023 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Äðóãè
| Ìîíîãðàôèè
| Æåëåçîâ, Ñ., Êîðäîâ, Ê., Ìåòîäè íà ñòåãàíîëîãè÷íàòà ïîäñèñòåìà çà èíôîðìàöèîííà çàùèòà, 240 ñòð., Óíèâåðñèòåòñêî èçäàòåëñòâî Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè, Øóìåí, 2023, ISBN: 978-619-201-712-5 |
01.09.2023 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Æåëåçîâ, Ñò. Web- áàçèðàíà èíôîðìàöèîííà ñèñòåìà çà îáó÷åíèå ïî äèñöèïëèíàòà “Êîìïþòúðíè ìðåæè è êîìóíèêàöèè”. Íàó÷íè òðóäîâå, Ïåäàãîãè÷åñêè êîëåæ -Äîáðè÷, òîì IIID, Óíèâåðñèòåòñêî èçä-âî “Åï. Ê. Ïðåñëàâñêè”, Øóìåí, 2003, ñòð. 89-93 ( ñúàâò. ñúñ Ñòàíåâ Ñò., Ãóãîâ Ç., Ïåíåâà-×îíîâñêà Ñò. , Èâàíîâ Ô.) |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Æåëåçîâ, Ñò. Âèðòóàëíè èñòîðè÷åñêè êàðòè íà Øóìåíñêî ïëàòî. Íàó÷íè òðóäîâå, Ïåäàãîãè÷åñêè êîëåæ- Äîáðè÷, III D , Óíèâåðñèòåòñêî èçä-âî “Åï. Ê. Ïðåñëàâñêè”,Øóìåí, 2003, ñòð. 94-98 ( ñúàâò. ñ Àíäðååâ À., Ìàðêîâ Ì., Ñòàíåâ Ñò. ) |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Æåëåçîâ, Ñò. Ïðîãðàìíè ñðåäè çà âèðòóàëíî ìîäåëèðàíå íà èñòîðè÷åñêè îáåêòè è ñöåíè. Íàó÷íè òðóäîâå, Ïåäàãîãè÷åñêè êîëåæ- Äîáðè÷, III D , Óíèâåðñèòåòñêîèçä-âî “Åï. Ê. Ïðåñëàâñêè”, Øóìåí, 2003, ñòð. 113-120, ( ñúàâò. ñ Ñò. Ñòàíåâ, À. Àíäðååâ, Í. Õðèñòîâà, Ì. Ñòîé÷åâ) |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Æåëåçîâ, Ñò Èíôîðìàöèîííà ñèñòåìà ïî ó÷åáíàòà äèñöèïëèíà “Ñèãóðíîñò â Èíòåðíåò”. Íàó÷íà êîíôåðåíöèÿ, ïîñâåòåíà íà 150 ãîäèíè îò ðîæäåíèåòî íà ÀíðèÏîàíêàðå, ØÓ “Åï. Ê.Ïðåñëàâñêè” (â ñúàâò. ñ Ñò. Ñòàíåâ) |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Æåëåçîâ, Ñò. Ìåòîäè çà çàùèòà íà èíôîðìàöèÿòà â óíèâåðñèòåò ñ ðåãèîíàëíî ðàçïðåäåëåíèå. Äîêëàä íà Íàöèîíàëíà íàó÷íà êîíôåðåíöèÿ “Èíôîðìàòèêàòà âíàó÷íîòî ïîçíàíèå” Âàðíåíñêè ñâîáîäåí óíèâåðñèòåò è Èíñòèòóò ïî ìàòåìàòèêà è èíôîðìàòèêà íà ÁÀÍ , Âàðíà, (â ñúàâò. ñ: Èâàí Êðúñòåâ Öîíåâ, Êðåìåí Æåëÿçêîâ Õðèñòîâ) |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Æåëåçîâ, Ñò. Àíàëèç íà ðèñêà è êîìïëåêñíà îöåíêà íà çàùèòåíîñòòà íà êîìóíèêàöèîííî-èíôîðìàöèîííè ñèñòåìè. Äîêëàä íà Äîêòîðàíòñêà íàó÷íà ñåñèÿ íà ØÓ“Åï. Ê. Ïðåñëàâñêè” |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Æåëåçîâ, Ñò. Web-áàçèðàíè èíôîðìàöèîííè ñèñòåìè çà çàùèòà íà èíôîðìàöèÿòà â ìàëêàòà ôèðìà – èíôîðìàöèîíåí è ìîíèòîðåí ìîäóë. Âòîðà íàöèîíàëíàíàó÷íà êîíôåðåíöèÿ “Èíôîðìàòèêàòà â íàó÷íîòî ïîçíàíèå”, Âàðíåíñêè ñâîáîäåí óíèâåðñèòåò “×. Õðàáúð”, Âàðíà, 2004,) (â ñúàâò. ñ Ñò. Ñòàíåâ, Ïë. Äèìèòðîâ) |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Æåëåçîâ, Ñò. Web-áàçèðàíà èíôîðìàöèîííà ñèñòåìà çà çàùèòà íà èíôîðìàöèÿòà â ìàëêàòà ôèðìà. Ñáîðíèê íàó÷íè òðóäîâå, ïîñâåòåí íà 100-ãîäèøíèíàòà îòðîæäåíèåòî íà Äæîí Àòàíàñîâ, ò. III, Øóìåí, , ñòð. 167 (â ñúàâò. ñ Ñò. Ñòàíåâ è Ç. Ãóãîâ) |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Æåëåçîâ, Ñò Web – based informational system for information security in small firms – informational and monitorial module. International Conference “Cognitive Modeling InLinguistics” Cml Varna 2005 (â ñúàâò. ñ Ñò. Ñòàíåâ) |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ñáîðíèê
| Ñòàòèè
| Æåëåçîâ Ñò., Àëãîðèòúì è ïðîãðàìà çà ñòåãàíîãðàôñêà çàùèòà. Íàó÷íà êîíôåðåíöèÿ íà ôàêóëòåò “À, ÏÂÎ è ÊÈÑ”, Øóìåí, 2007, ( ñúàâò. ñúñ Ñò. Ñòàíåâ Ñò.,Öàíêîâ Ö., Ïàðàñêåâîâ,Õð.) |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ñáîðíèê
| Ñòàòèè
| Ñòàíåâ, Ñò. Ê âîïðîñó ïðèìåíåíèÿ òåðìèíà „Ýôôåêòèâíîñòü ñòåãîñèñòåì” â ó÷åáíîì êóðñå „ Êîìïþòåðíàÿ ñòåãàíîãðàôèÿ”(  ñúàâò. ñ Æåëåçîâ,Ñ.,Âåëèêîâà, Ò.,Íåäåë÷åâà, Â. È Èâàíîâà,Ì.). Òðóäîâå íà ìåæäóíàðîäíàòà íàó÷íî-ïðàêòè÷åñêà êîíôåðåíöèÿ íà ÍÏÓ „Äðàãîìàíîâ”, Êèîåâ, 2011,ñòð.310-311 |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ñáîðíèê
| Ñòàòèè
| Ñ. Æåëåçîâ., Ñòàíåâ, Ñ. Ïåðâûå ðåçóëüòàòû âíåäðåíèÿ êóðñà „Êîìïþòåðíàÿ ñòåãàíîãðàôèÿ” â Øóìåíñêîì óíèâåðñèòåòå. Òðóäîâå íà ìåæäóíàðîäíàòà íàó÷íî-ïðàêòè÷åñêà êîíôåðåíöèÿ íà ÂÄÏÓ „Êîöþáèíñêè”, Âèíèöà,Óêðàéíà, 2012,ñòð.205-207. |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Uzunova-Dimitrova B.Hr., Lecheva D.L., Zhelezov S.K. WEB-BASED INFORMATION SYSTEM FOR TEST-TESTING AND EVALUATION. VIII Ìåæäóíàðîäíîé íàó÷íî-ïðàêòè÷åñêîé êîíôåðåíöèè, ÀÃÅÍÒÑÒÂÎ ÏÅÐÑÏÅÊÒÈÂÍÛÕ ÍÀÓ×ÍÛÕ ÈÑÑËÅÄÎÂÀÍÈÉ (ÀÏÍÈ), ÒÅÎÐÅÒÈ×ÅÑÊÈÅ È ÏÐÈÊËÀÄÍÛÅ ÀÑÏÅÊÒÛ ÑÎÂÐÅÌÅÍÍÎÉ ÍÀÓÊÈ, 2015, ×àñòü II, ð. 5-9, ISSN 2413-0869, (ÐÈÍÖ) ïî äîãîâîðó ¹ 301-05/2015 îò 13.05.2015 ã |
09.03.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòóäèè
| Kordov, K., & Zhelezov, S. (2021). Steganography in color images with random order of pixel selection and encrypted text message embedding. PeerJ Computer Science, 7, e380. (Scopus, Web of Science - Q1) |
02.02.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ñáîðíèê
| Ñòàòèè
| Íèêîëîâà, Ì., Ñòîÿíîâà, Ò., Æåëåçîâ, Ñ., ßíàêèåâà, Â., Èçãðàæäàíå íà âèðòóàëåí ìîäåë íà çàùèòåíà èíôðàñòðóêòóðà, ÌÀÒÒÅÕ 2020, (2020), CONFERENCE PROCEEDINGS, v. 1, pp. 87 - 103. (ISSN:1314-3921) |
05.01.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Zhelezov, S., & Harizanova, D. (2020). Automated System for Development of Doctoral Documentation. Mathematical and Software Engineering, 6(1), 7-11.(ISSN: 2367-7449) |
05.01.2021 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Äðóãè
| Ó÷åáíè ïîìàãàëà
| Ñòàíåâ, Ñ., Ïàðàñêåâîâ, Õ., Æåëåçîâ, Ñ., Êîìïþòúðíà ñòåãàíîãðàôèÿ. Ìåòîäè÷åñêî ðúêîâîäñòâî, VI ÷àñò, Óíèâåðñèòåòñêî èçäåòåëñòâî Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè, 2014 ã., ñòð. 30 - 52 |
01.12.2020 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Äðóãè
| Ó÷åáíè ïîìàãàëà
| Ñòàíåâ, Ñ., Æåëåçîâ, Ñ., Ïàðàñêåâîâ, Õ., Õðèñòîâ, Õ., Ðúêîâîäñòâî çà óïðàæíåíèÿ ïî ñòåãàíîãðàôèÿ, Óíèâåðñèòåòñêî èçäàòåëñòâî, Øóìåí, 2015, ISBN 978-619-201-011-9 |
01.12.2020 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Äðóãè
| Ìîíîãðàôèè
| Æåëåçîâ, Ñ., Ìåòîäè íà òåêñòîâàòà ñòåãàíîãðàôèÿ, Óíèâåðñèòåòñêî èçäàòåëñòâî Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè, Øóìåí, 2020, ISBN: 978-619-201-443-8 |
01.12.2020 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Popov, D., Popova, V., Kordov, K., Zhelezov, S., Bulgarian Associative Dictionaries in the LABLASS Web-Based System, (2020) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12335 LNAI, pp. 379-388.(ISSN:0302-9743, SJR 2019: 0.427) |
26.10.2020 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ãîäèøíèê
| Ñòàòèè
| Õàðèçàíîâà, Ä., Æåëåçîâ, Ñ., Ïðèëîæåíèå çà ãåíåðèðàíå íà ó÷åáíà äîêóìåíòàöèÿ, Ñáîðíèê ñòóäåíòñêè íàó÷íè ïóáëèêàöèè, Ôàêóëòåò ïî ìàòåìàòèêà è èíôîðìàòèêà, 2019, ñòð. 61 - 70. |
19.11.2019 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ãîäèøíèê
| Ñòàòèè
| Ìèðåâ, Ê., Æåëåçîâ, Ñ., 3D ÌÎÄÅËÈÐÀÍÅ È ÂÈÐÒÓÀËÈÇÀÖÈß ÍÀ ÊÎÌÏÞÒÚÐÅÍ ÌÓÇÅÉ, Ñáîðíèê ñòóäåíòñêè íàó÷íè ïóáëèêàöèè, Ôàêóëòåò ïî ìàòåìàòèêà è èíôîðìàòèêà, 2019, ñòð. 47 - 60. |
19.11.2019 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Stoyanov, S., & Zhelezov, S. (2019). New Functionalities of a Virtual Computer Model Design and Construction. Mathematical and Software Engineering, 5(2), 23-33. |
19.11.2019 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ñáîðíèê
| Ñòàòèè
| Õðèñòîâ, Ë., Æåëåçîâ, Ñ., (2019) ÀÓÒÑÎÐÑÈÍà ÍÀ ÊÎÐÏÎÐÀÒÈÂÍÀÒÀ ÈÊÎÍÎÌÈ×ÅÑÊÀ ÑÈÃÓÐÍÎÑÒ, ÑÁÎÐÍÈÊ ÄÎÊËÀÄÈ ÎÒ ÃÎÄÈØÍÀ ÓÍÈÂÅÐÑÈÒÅÒÑÊÀ ÍÀÓ×ÍÀ ÊÎÍÔÅÐÅÍÖÈß íà ÍÂÓ, Èçäàòåëñêè êîìïëåêñ íà ÍÂÓ „Âàñèë Ëåâñêè”, Âåëèêî Òúðíîâî, ñòð. 902-910, ISSN 2367-7481 |
19.11.2019 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ãîäèøíèê
| Ñòóäèè
| Ñòîÿíîâà, Ò., Æåëåçîâ, Ñ., ÌÅÒÎÄÈ ÍÀ ÒÅÊÑÒÎÂÀÒÀ ÑÒÅÃÀÍÎÃÐÀÔÈß, Annual of Konstantin Preslavsky University of Shumen, Faculty of Mathematics and Informatics, vol. ÕX Ñ, 2019, pp. 67 - 92. |
19.11.2019 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Ñ. Æåëåçîâ, Ñ. Ñòàíåâ è È. ßêèìîâ. Ðåàëèçàöèÿ íà ïàðàëåëåí ñòåãàíàëèç ñ êëúñòåðíà ñèñòåìà., Ñáîðíèê îò ìåæäóíàðîäíà íàó÷íà êîíôåðåíöèÿ „Ñúâðåìåííè ìåòîäè è òåõíîëîãèè â íàó÷íèòå èçñëåäâàíèÿ”, Âàðíà, 2012, ñòð. 122-127.
Öèòèðàíà â:
Êîðäîâ, Ê., Éîðäàíîâ, Ä., Ñòåãàíîãðàôñêè ïîäõîä, áàçèðàí íà êîìïþòúðíà èãðà, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 167-174
|
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Ñòàíåâ, Ñ., Æåëåçîâ, Ñ., Ïàðàñêåâîâ, Õ., Õðèñòîâ, Õ., Ðúêîâîäñòâî çà óïðàæíåíèÿ ïî ñòåãàíîãðàôèÿ, Óíèâåðñèòåòñêî èçäàòåëñòâî, Øóìåí, 2015, ISBN 978-619-201-011-9
Öèòèðàíà â:
Êîðäîâ, Ê., Éîðäàíîâ, Ä., Ñòåãàíîãðàôñêè ïîäõîä, áàçèðàí íà êîìïþòúðíà èãðà, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 167-174
|
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Ñòàíåâ, Ñ., Æåëåçîâ, Ñ., Êîìïþòúðíà è ìðåæîâà ñèãóðíîñò, Óíèâåðñèòåòñêî èçäåòåëñòâî "Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè", Øóìåí, 2005
Öèòèðàíà â:
ßíàêèåâà, Â., Ñòîÿíîâà, Ò., Ransomware àòàêè è ïðîòèâîäåéñòâèå, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 189-195
|
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Æåëåçîâ, Ñ., Îöåíêà íà åôåêòèâíîñòòà íà ñèñòåìè çà çàùèòà íà èíôîðìàöèÿòà â êîìïþòúðíèòå ñèñòåìè, Äèñåðòàöèîíåí òðóä, Óíèâåðñèòåòñêî èçäåòåëñòâî "Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè", 2014 ã., Øóìåí
Öèòèðàíà â:
ßíàêèåâà, Â., Ñòîÿíîâà, Ò., Ransomware àòàêè è ïðîòèâîäåéñòâèå, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 189-195
|
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Zhelezov, S., H. Paraskevov, H. Hristov, P. Boyanov, B. Uzunova, An architecture of steganological subsystem for information protection, Proceedings of 10-th International Conference ICBBM, Liepaya, Latvia, 2014, p. 123-128
Öèòèðàíà â:
ßíàêèåâà, Â., Ñòîÿíîâà, Ò., Ransomware àòàêè è ïðîòèâîäåéñòâèå, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 189-195
|
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Zhelezov, Stanimir. "Modified Algorithm for Steganalysis." Mathematical and Software Engineering 1.2 (2016): 31-36.
Öèòèðàíà â:
Hristov, H. (2018). Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies. Mathematical and Software Engineering, 4(1), 1-6.
|
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Nachev, A., S. Zhelezov. Assessing the efficiency of information protection systems in the computer systems and networks. Information Technology and Security” ¹ 1(3)-2013 79 ÓÄÊ 004.056.5, Êèåâ, Ñòð. 79-86
Öèòèðàíà â:
Hristov, H. (2018). Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies. Mathematical and Software Engineering, 4(1), 1-6.
|
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B.P., Zhelezov, S.K., Kordov, K.M. Least significant bit image steganography algorithm based on chaotic rotation equations (2016) Comptes Rendus de L’Academie Bulgare des Sciences, 69 (7), pp. 845-850
Öèòèðàíà â:
Liu, J., Tian, H., Chang, C. C., Wang, T., Chen, Y., & Cai, Y. (2018). Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test. Symmetry, 10(8), 336. (SJR 2017 - 0.334)
|
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Stoyanov, B.P., Zhelezov, S.K., Kordov, K.M. Least significant bit image steganography algorithm based on chaotic rotation equations (2016) Comptes Rendus de L’Academie Bulgare des Sciences, 69 (7), pp. 845-850
Öèòèðàíà â:
Hristov, H. (2018). Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies. Mathematical and Software Engineering, 4(1), 1-6.;
Ïàðàñêåâîâ, Õ., Ñòåôàíîâ, À., Ñúâðåìåííè ñòåãàíîãðàôñêè ïîäõîäè â ñîöèàëíèòå ìðåæè, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 197-203
|
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Ñòàíèìèð Æåëåçîâ, Ñòàíèìèð Ñòàíåâ, Òåîäîð Ãåîðãèåâ, Çà åäíî ïðèëîæåíèå çà äîáàâåíà ðåàëíîñò â óåá áàçèðàíà ñðåäà è 2D áàðêîä ìàðêåðè, Ìàòåìàòèêà, êîìïþòúðíè íàóêè è îáðàçîâàíèå, ISSN: 2603-4670, 2018, 30-36 |
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ñáîðíèê
| Ñòàòèè
| Ñòîÿíîâ, Ñ., Æåëåçîâ, Ñ., Ïðîåêòèðàíå è èçãðàæäàíå íà âèðòóàëåí ìîäåë íà êîìïþòúðíà ñèñòåìà, ÌÀÒÒÅÕ 2018, Òîì 1, ñòð. 205-212 |
22.11.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Zhelezov, S., Uzunova-Dimitrova, B., Paraskevov, H., An approach for hiding steganography data within web applications, Journal of Engineering and Applied Sciences 12(Specialissue8), pp. 8251-8255 (sjr 2017: 0.163) |
12.09.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Boryana, U.-D., Stanimir, Z., Hristo, P., Intelligent methods for evaluation of student written works, Journal of Engineering and Applied Sciences 12(Specialissue10), pp. 8780-8784 (sjr 2017: 0.163) |
12.09.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Äðóãè
| Ó÷åáíèöè
| Æåëåçîâ, Ñò., Àëèåâ, Ñ., Java àïëåòè, Óíèâåðñèòåòñêî èçäàòåëñòâî, Øóìåí, 2018, ISBN 978-619-201-236-6 |
12.09.2018 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Kordov, K., & Bonchev, L. (2017). Using circle map for audio encryption algorithm. Mathematical and Software Engineering, 3(2), 183-189. |
22.11.2017 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Kordov, K. M., & Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunications, 63(4), 417-422. |
22.11.2017 |
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Paraskevov, H., Zhelezov, S., Uzunova-Dimitrova, B., Robustness of the secret message in stego file against flip and rotation attack, Annals of the Academy of Romanian Scientists: Series on Mathematics and its Applications
9(1), 2017, pp. 5-16, (SJR 2015 - 0.141) |
29.06.2017 |