print
Òúðñè Îáùà ñòàòèñòèêà Ïðåïîäàâàòåëè
string(2) "11"
ÔÌÈ / ÊÎÌÏÞÒÚÐÍÈ ÑÈÑÒÅÌÈ È ÒÅÕÍÎËÎÃÈÈ / Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ
Ñòðàíèöà: 1/2,îáùî çàïèñè:91
íàïðåä
Àâòîð Òèï Êàòåãîðèÿ Ïóáëèêàöèÿ Ðåäàêöèÿ
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè Uzunova-Dimitrova, B., Zhelezov, S., (2024), Application of the One-Parameter Rasch Model to Quality Education Through Evaluation and Survey Analysis, TEM Journal 13(3), pp. 2534-2543. (Scopus Q3, WoS Q4), DOI 10.18421/TEM133-79 30.10.2024
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè Uzunova-Dimitrova, B., Paraskevov, H., & Zhelezov, S. (2023). Objective Assessment During a Pandemic. TEM Journal, 12(1). (Scopus Q3, WoS Q4) 30.10.2024
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè S. Zhelezov, K. Kordov, A. Nachev and D. Pavlova, \"Spread Spectrum Steganography In Audio Containers,\" 2023 5th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), Lipetsk, Russian Federation, 2023, pp. 568-571, doi: 10.1109/SUMMA60232.2023.10349403. (Scopus) 14.10.2024
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè A. Nachev, D. Pavlova, S. Zhelezov, K. Kordov and P. Gindev, \"Execution Of Information Processes Subjected To The Influence Of Two Types Of Disturbing Effects With Different Probability Characteristics,\" 2023 5th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), Lipetsk, Russian Federation, 2023, pp. 572-574, doi: 10.1109/SUMMA60232.2023.10349535. (Scopus) 14.10.2024
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè Zhelezov, S., Kordov, K., Nachev, A., Stoyanova, T., Uzunova-Dimitrova, B., & Pavlova, D. (2021). Study of the Efficiency Coefficient of the Steganographic Embedding in Text Containers Using the Letter Replacement Method. In 2021 3rd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), pp. 680-684, IEEE. (Scopus) 01.09.2023
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè Kordov, K., Zhelezov, S., Nachev, A., Gueorguiev, N., & Pavlova, D. (2021). Design of Digital Image Encryption Scheme With Cryptographic Analysis. In 2021 3rd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), pp. 685-692, IEEE. (Scopus) 01.09.2023
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè Nachev, A., Kordov, K., Zhelezov, S., Gueorguiev, N., & Pavlova, D. (2021). Influence of Two Types of Disturbing Effects with Different Statistical Characteristics on the Efficiency of Information Processes Implementation. In 2021 3rd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), pp. 693-695, IEEE. (Scopus) 01.09.2023
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Äðóãè Ìîíîãðàôèè Æåëåçîâ, Ñ., Êîðäîâ, Ê., Ìåòîäè íà ñòåãàíîëîãè÷íàòà ïîäñèñòåìà çà èíôîðìàöèîííà çàùèòà, 240 ñòð., Óíèâåðñèòåòñêî èçäàòåëñòâî Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè, Øóìåí, 2023, ISBN: 978-619-201-712-5 01.09.2023
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Æåëåçîâ, Ñò. Web- áàçèðàíà èíôîðìàöèîííà ñèñòåìà çà îáó÷åíèå ïî äèñöèïëèíàòà “Êîìïþòúðíè ìðåæè è êîìóíèêàöèè”. Íàó÷íè òðóäîâå, Ïåäàãîãè÷åñêè êîëåæ -Äîáðè÷, òîì IIID, Óíèâåðñèòåòñêî èçä-âî “Åï. Ê. Ïðåñëàâñêè”, Øóìåí, 2003, ñòð. 89-93 ( ñúàâò. ñúñ Ñòàíåâ Ñò., Ãóãîâ Ç., Ïåíåâà-×îíîâñêà Ñò. , Èâàíîâ Ô.) 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Æåëåçîâ, Ñò. Âèðòóàëíè èñòîðè÷åñêè êàðòè íà Øóìåíñêî ïëàòî. Íàó÷íè òðóäîâå, Ïåäàãîãè÷åñêè êîëåæ- Äîáðè÷, III D , Óíèâåðñèòåòñêî èçä-âî “Åï. Ê. Ïðåñëàâñêè”,Øóìåí, 2003, ñòð. 94-98 ( ñúàâò. ñ Àíäðååâ À., Ìàðêîâ Ì., Ñòàíåâ Ñò. ) 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Æåëåçîâ, Ñò. Ïðîãðàìíè ñðåäè çà âèðòóàëíî ìîäåëèðàíå íà èñòîðè÷åñêè îáåêòè è ñöåíè. Íàó÷íè òðóäîâå, Ïåäàãîãè÷åñêè êîëåæ- Äîáðè÷, III D , Óíèâåðñèòåòñêîèçä-âî “Åï. Ê. Ïðåñëàâñêè”, Øóìåí, 2003, ñòð. 113-120, ( ñúàâò. ñ Ñò. Ñòàíåâ, À. Àíäðååâ, Í. Õðèñòîâà, Ì. Ñòîé÷åâ) 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Æåëåçîâ, Ñò Èíôîðìàöèîííà ñèñòåìà ïî ó÷åáíàòà äèñöèïëèíà “Ñèãóðíîñò â Èíòåðíåò”. Íàó÷íà êîíôåðåíöèÿ, ïîñâåòåíà íà 150 ãîäèíè îò ðîæäåíèåòî íà ÀíðèÏîàíêàðå, ØÓ “Åï. Ê.Ïðåñëàâñêè” (â ñúàâò. ñ Ñò. Ñòàíåâ) 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Æåëåçîâ, Ñò. Ìåòîäè çà çàùèòà íà èíôîðìàöèÿòà â óíèâåðñèòåò ñ ðåãèîíàëíî ðàçïðåäåëåíèå. Äîêëàä íà Íàöèîíàëíà íàó÷íà êîíôåðåíöèÿ “Èíôîðìàòèêàòà âíàó÷íîòî ïîçíàíèå” Âàðíåíñêè ñâîáîäåí óíèâåðñèòåò è Èíñòèòóò ïî ìàòåìàòèêà è èíôîðìàòèêà íà ÁÀÍ , Âàðíà, (â ñúàâò. ñ: Èâàí Êðúñòåâ Öîíåâ, Êðåìåí Æåëÿçêîâ Õðèñòîâ) 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Æåëåçîâ, Ñò. Àíàëèç íà ðèñêà è êîìïëåêñíà îöåíêà íà çàùèòåíîñòòà íà êîìóíèêàöèîííî-èíôîðìàöèîííè ñèñòåìè. Äîêëàä íà Äîêòîðàíòñêà íàó÷íà ñåñèÿ íà ØÓ“Åï. Ê. Ïðåñëàâñêè” 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Æåëåçîâ, Ñò. Web-áàçèðàíè èíôîðìàöèîííè ñèñòåìè çà çàùèòà íà èíôîðìàöèÿòà â ìàëêàòà ôèðìà – èíôîðìàöèîíåí è ìîíèòîðåí ìîäóë. Âòîðà íàöèîíàëíàíàó÷íà êîíôåðåíöèÿ “Èíôîðìàòèêàòà â íàó÷íîòî ïîçíàíèå”, Âàðíåíñêè ñâîáîäåí óíèâåðñèòåò “×. Õðàáúð”, Âàðíà, 2004,) (â ñúàâò. ñ Ñò. Ñòàíåâ, Ïë. Äèìèòðîâ) 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Æåëåçîâ, Ñò. Web-áàçèðàíà èíôîðìàöèîííà ñèñòåìà çà çàùèòà íà èíôîðìàöèÿòà â ìàëêàòà ôèðìà. Ñáîðíèê íàó÷íè òðóäîâå, ïîñâåòåí íà 100-ãîäèøíèíàòà îòðîæäåíèåòî íà Äæîí Àòàíàñîâ, ò. III, Øóìåí, , ñòð. 167 (â ñúàâò. ñ Ñò. Ñòàíåâ è Ç. Ãóãîâ) 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Æåëåçîâ, Ñò Web – based informational system for information security in small firms – informational and monitorial module. International Conference “Cognitive Modeling InLinguistics” Cml Varna 2005 (â ñúàâò. ñ Ñò. Ñòàíåâ) 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ñáîðíèê Ñòàòèè Æåëåçîâ Ñò., Àëãîðèòúì è ïðîãðàìà çà ñòåãàíîãðàôñêà çàùèòà. Íàó÷íà êîíôåðåíöèÿ íà ôàêóëòåò “À, ÏÂÎ è ÊÈÑ”, Øóìåí, 2007, ( ñúàâò. ñúñ Ñò. Ñòàíåâ Ñò.,Öàíêîâ Ö., Ïàðàñêåâîâ,Õð.) 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ñáîðíèê Ñòàòèè Ñòàíåâ, Ñò. Ê âîïðîñó ïðèìåíåíèÿ òåðìèíà „Ýôôåêòèâíîñòü ñòåãîñèñòåì” â ó÷åáíîì êóðñå „ Êîìïþòåðíàÿ ñòåãàíîãðàôèÿ”(  ñúàâò. ñ Æåëåçîâ,Ñ.,Âåëèêîâà, Ò.,Íåäåë÷åâà, Â. È Èâàíîâà,Ì.). Òðóäîâå íà ìåæäóíàðîäíàòà íàó÷íî-ïðàêòè÷åñêà êîíôåðåíöèÿ íà ÍÏÓ „Äðàãîìàíîâ”, Êèîåâ, 2011,ñòð.310-311 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ñáîðíèê Ñòàòèè Ñ. Æåëåçîâ., Ñòàíåâ, Ñ. Ïåðâûå ðåçóëüòàòû âíåäðåíèÿ êóðñà „Êîìïþòåðíàÿ ñòåãàíîãðàôèÿ” â Øóìåíñêîì óíèâåðñèòåòå. Òðóäîâå íà ìåæäóíàðîäíàòà íàó÷íî-ïðàêòè÷åñêà êîíôåðåíöèÿ íà ÂÄÏÓ „Êîöþáèíñêè”, Âèíèöà,Óêðàéíà, 2012,ñòð.205-207. 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Ñòàòèè Uzunova-Dimitrova B.Hr., Lecheva D.L., Zhelezov S.K. WEB-BASED INFORMATION SYSTEM FOR TEST-TESTING AND EVALUATION. VIII Ìåæäóíàðîäíîé íàó÷íî-ïðàêòè÷åñêîé êîíôåðåíöèè, ÀÃÅÍÒÑÒÂÎ ÏÅÐÑÏÅÊÒÈÂÍÛÕ ÍÀÓ×ÍÛÕ ÈÑÑËÅÄÎÂÀÍÈÉ (ÀÏÍÈ), ÒÅÎÐÅÒÈ×ÅÑÊÈÅ È ÏÐÈÊËÀÄÍÛÅ ÀÑÏÅÊÒÛ ÑÎÂÐÅÌÅÍÍÎÉ ÍÀÓÊÈ, 2015, ×àñòü II, ð. 5-9, ISSN 2413-0869, (ÐÈÍÖ) ïî äîãîâîðó ¹ 301-05/2015 îò 13.05.2015 ã 09.03.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòóäèè Kordov, K., & Zhelezov, S. (2021). Steganography in color images with random order of pixel selection and encrypted text message embedding. PeerJ Computer Science, 7, e380. (Scopus, Web of Science - Q1) 02.02.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ñáîðíèê Ñòàòèè Íèêîëîâà, Ì., Ñòîÿíîâà, Ò., Æåëåçîâ, Ñ., ßíàêèåâà, Â., Èçãðàæäàíå íà âèðòóàëåí ìîäåë íà çàùèòåíà èíôðàñòðóêòóðà, ÌÀÒÒÅÕ 2020, (2020), CONFERENCE PROCEEDINGS, v. 1, pp. 87 - 103. (ISSN:1314-3921) 05.01.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Ñòàòèè Zhelezov, S., & Harizanova, D. (2020). Automated System for Development of Doctoral Documentation. Mathematical and Software Engineering, 6(1), 7-11.(ISSN: 2367-7449) 05.01.2021
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Äðóãè Ó÷åáíè ïîìàãàëà Ñòàíåâ, Ñ., Ïàðàñêåâîâ, Õ., Æåëåçîâ, Ñ., Êîìïþòúðíà ñòåãàíîãðàôèÿ. Ìåòîäè÷åñêî ðúêîâîäñòâî, VI ÷àñò, Óíèâåðñèòåòñêî èçäåòåëñòâî Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè, 2014 ã., ñòð. 30 - 52 01.12.2020
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Äðóãè Ó÷åáíè ïîìàãàëà Ñòàíåâ, Ñ., Æåëåçîâ, Ñ., Ïàðàñêåâîâ, Õ., Õðèñòîâ, Õ., Ðúêîâîäñòâî çà óïðàæíåíèÿ ïî ñòåãàíîãðàôèÿ, Óíèâåðñèòåòñêî èçäàòåëñòâî, Øóìåí, 2015, ISBN 978-619-201-011-9 01.12.2020
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Äðóãè Ìîíîãðàôèè Æåëåçîâ, Ñ., Ìåòîäè íà òåêñòîâàòà ñòåãàíîãðàôèÿ, Óíèâåðñèòåòñêî èçäàòåëñòâî Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè, Øóìåí, 2020, ISBN: 978-619-201-443-8 01.12.2020
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè Popov, D., Popova, V., Kordov, K., Zhelezov, S., Bulgarian Associative Dictionaries in the LABLASS Web-Based System, (2020) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12335 LNAI, pp. 379-388.(ISSN:0302-9743, SJR 2019: 0.427) 26.10.2020
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ãîäèøíèê Ñòàòèè Õàðèçàíîâà, Ä., Æåëåçîâ, Ñ., Ïðèëîæåíèå çà ãåíåðèðàíå íà ó÷åáíà äîêóìåíòàöèÿ, Ñáîðíèê ñòóäåíòñêè íàó÷íè ïóáëèêàöèè, Ôàêóëòåò ïî ìàòåìàòèêà è èíôîðìàòèêà, 2019, ñòð. 61 - 70. 19.11.2019
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ãîäèøíèê Ñòàòèè Ìèðåâ, Ê., Æåëåçîâ, Ñ., 3D ÌÎÄÅËÈÐÀÍÅ È ÂÈÐÒÓÀËÈÇÀÖÈß ÍÀ ÊÎÌÏÞÒÚÐÅÍ ÌÓÇÅÉ, Ñáîðíèê ñòóäåíòñêè íàó÷íè ïóáëèêàöèè, Ôàêóëòåò ïî ìàòåìàòèêà è èíôîðìàòèêà, 2019, ñòð. 47 - 60. 19.11.2019
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  íàó÷íî ñïèñàíèå Ñòàòèè Stoyanov, S., & Zhelezov, S. (2019). New Functionalities of a Virtual Computer Model Design and Construction. Mathematical and Software Engineering, 5(2), 23-33. 19.11.2019
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ñáîðíèê Ñòàòèè Õðèñòîâ, Ë., Æåëåçîâ, Ñ., (2019) ÀÓÒÑÎÐÑÈÍà ÍÀ ÊÎÐÏÎÐÀÒÈÂÍÀÒÀ ÈÊÎÍÎÌÈ×ÅÑÊÀ ÑÈÃÓÐÍÎÑÒ, ÑÁÎÐÍÈÊ ÄÎÊËÀÄÈ ÎÒ ÃÎÄÈØÍÀ ÓÍÈÂÅÐÑÈÒÅÒÑÊÀ ÍÀÓ×ÍÀ ÊÎÍÔÅÐÅÍÖÈß íà ÍÂÓ, Èçäàòåëñêè êîìïëåêñ íà ÍÂÓ „Âàñèë Ëåâñêè”, Âåëèêî Òúðíîâî, ñòð. 902-910, ISSN 2367-7481 19.11.2019
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ãîäèøíèê Ñòóäèè Ñòîÿíîâà, Ò., Æåëåçîâ, Ñ., ÌÅÒÎÄÈ ÍÀ ÒÅÊÑÒÎÂÀÒÀ ÑÒÅÃÀÍÎÃÐÀÔÈß, Annual of Konstantin Preslavsky University of Shumen, Faculty of Mathematics and Informatics, vol. ÕX Ñ, 2019, pp. 67 - 92. 19.11.2019
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Ñ. Æåëåçîâ, Ñ. Ñòàíåâ è È. ßêèìîâ. Ðåàëèçàöèÿ íà ïàðàëåëåí ñòåãàíàëèç ñ êëúñòåðíà ñèñòåìà., Ñáîðíèê îò ìåæäóíàðîäíà íàó÷íà êîíôåðåíöèÿ „Ñúâðåìåííè ìåòîäè è òåõíîëîãèè â íàó÷íèòå èçñëåäâàíèÿ”, Âàðíà, 2012, ñòð. 122-127. Öèòèðàíà â: Êîðäîâ, Ê., Éîðäàíîâ, Ä., Ñòåãàíîãðàôñêè ïîäõîä, áàçèðàí íà êîìïþòúðíà èãðà, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 167-174 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Ñòàíåâ, Ñ., Æåëåçîâ, Ñ., Ïàðàñêåâîâ, Õ., Õðèñòîâ, Õ., Ðúêîâîäñòâî çà óïðàæíåíèÿ ïî ñòåãàíîãðàôèÿ, Óíèâåðñèòåòñêî èçäàòåëñòâî, Øóìåí, 2015, ISBN 978-619-201-011-9 Öèòèðàíà â: Êîðäîâ, Ê., Éîðäàíîâ, Ä., Ñòåãàíîãðàôñêè ïîäõîä, áàçèðàí íà êîìïþòúðíà èãðà, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 167-174 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Ñòàíåâ, Ñ., Æåëåçîâ, Ñ., Êîìïþòúðíà è ìðåæîâà ñèãóðíîñò, Óíèâåðñèòåòñêî èçäåòåëñòâî "Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè", Øóìåí, 2005 Öèòèðàíà â: ßíàêèåâà, Â., Ñòîÿíîâà, Ò., Ransomware àòàêè è ïðîòèâîäåéñòâèå, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 189-195 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Æåëåçîâ, Ñ., Îöåíêà íà åôåêòèâíîñòòà íà ñèñòåìè çà çàùèòà íà èíôîðìàöèÿòà â êîìïþòúðíèòå ñèñòåìè, Äèñåðòàöèîíåí òðóä, Óíèâåðñèòåòñêî èçäåòåëñòâî "Åïèñêîï Êîíñòàíòèí Ïðåñëàâñêè", 2014 ã., Øóìåí Öèòèðàíà â: ßíàêèåâà, Â., Ñòîÿíîâà, Ò., Ransomware àòàêè è ïðîòèâîäåéñòâèå, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 189-195 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Zhelezov, S., H. Paraskevov, H. Hristov, P. Boyanov, B. Uzunova, An architecture of steganological subsystem for information protection, Proceedings of 10-th International Conference ICBBM, Liepaya, Latvia, 2014, p. 123-128 Öèòèðàíà â: ßíàêèåâà, Â., Ñòîÿíîâà, Ò., Ransomware àòàêè è ïðîòèâîäåéñòâèå, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 189-195 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Zhelezov, Stanimir. "Modified Algorithm for Steganalysis." Mathematical and Software Engineering 1.2 (2016): 31-36. Öèòèðàíà â: Hristov, H. (2018). Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies. Mathematical and Software Engineering, 4(1), 1-6. 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Nachev, A., S. Zhelezov. Assessing the efficiency of information protection systems in the computer systems and networks. Information Technology and Security” ¹ 1(3)-2013 79 ÓÄÊ 004.056.5, Êèåâ, Ñòð. 79-86 Öèòèðàíà â: Hristov, H. (2018). Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies. Mathematical and Software Engineering, 4(1), 1-6. 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B.P., Zhelezov, S.K., Kordov, K.M. Least significant bit image steganography algorithm based on chaotic rotation equations (2016) Comptes Rendus de L’Academie Bulgare des Sciences, 69 (7), pp. 845-850 Öèòèðàíà â: Liu, J., Tian, H., Chang, C. C., Wang, T., Chen, Y., & Cai, Y. (2018). Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test. Symmetry, 10(8), 336. (SJR 2017 - 0.334) 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Stoyanov, B.P., Zhelezov, S.K., Kordov, K.M. Least significant bit image steganography algorithm based on chaotic rotation equations (2016) Comptes Rendus de L’Academie Bulgare des Sciences, 69 (7), pp. 845-850 Öèòèðàíà â: Hristov, H. (2018). Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies. Mathematical and Software Engineering, 4(1), 1-6.; Ïàðàñêåâîâ, Õ., Ñòåôàíîâ, À., Ñúâðåìåííè ñòåãàíîãðàôñêè ïîäõîäè â ñîöèàëíèòå ìðåæè, Ñáîðíèê íàó÷íè òðóäîâå Ìàòòåõ 2018, òîì 1, ñòð. 197-203 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Ñòàòèè Ñòàíèìèð Æåëåçîâ, Ñòàíèìèð Ñòàíåâ, Òåîäîð Ãåîðãèåâ, Çà åäíî ïðèëîæåíèå çà äîáàâåíà ðåàëíîñò â óåá áàçèðàíà ñðåäà è 2D áàðêîä ìàðêåðè, Ìàòåìàòèêà, êîìïþòúðíè íàóêè è îáðàçîâàíèå, ISSN: 2603-4670, 2018, 30-36 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ñáîðíèê Ñòàòèè Ñòîÿíîâ, Ñ., Æåëåçîâ, Ñ., Ïðîåêòèðàíå è èçãðàæäàíå íà âèðòóàëåí ìîäåë íà êîìïþòúðíà ñèñòåìà, ÌÀÒÒÅÕ 2018, Òîì 1, ñòð. 205-212 22.11.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè Zhelezov, S., Uzunova-Dimitrova, B., Paraskevov, H., An approach for hiding steganography data within web applications, Journal of Engineering and Applied Sciences 12(Specialissue8), pp. 8251-8255 (sjr 2017: 0.163) 12.09.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè Boryana, U.-D., Stanimir, Z., Hristo, P., Intelligent methods for evaluation of student written works, Journal of Engineering and Applied Sciences 12(Specialissue10), pp. 8780-8784 (sjr 2017: 0.163) 12.09.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Äðóãè Ó÷åáíèöè Æåëåçîâ, Ñò., Àëèåâ, Ñ., Java àïëåòè, Óíèâåðñèòåòñêî èçäàòåëñòâî, Øóìåí, 2018, ISBN 978-619-201-236-6 12.09.2018
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ  ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Kordov, K., & Bonchev, L. (2017). Using circle map for audio encryption algorithm. Mathematical and Software Engineering, 3(2), 183-189. 22.11.2017
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Kordov, K. M., & Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunications, 63(4), 417-422. 22.11.2017
Äîö. ä-ð . Ñòàíèìèð Êóí÷åâ Æåëåçîâ Ñ èìïàêò ôàêòîð Ñòàòèè Paraskevov, H., Zhelezov, S., Uzunova-Dimitrova, B., Robustness of the secret message in stego file against flip and rotation attack, Annals of the Academy of Romanian Scientists: Series on Mathematics and its Applications 9(1), 2017, pp. 5-16, (SJR 2015 - 0.141) 29.06.2017
Ñòðàíèöà2: 1/2,îáùî çàïèñè:91