Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ
| Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: Ms_BJMCS_23924 „ Analysis of attacks and security issues on the peer-to-peer networks“ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Mathematics & Computer Science. – Ñåðòèôèêàò. |
22.02.2016 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Äîêëàäè
| Ñàâîâà-Òàøåâà, Æ. Í. Îáîáùåí ñàìîñâèâàù ãåíåðàòîð íà ïñåâäîñëó÷àéíè ïîñëåäîâàòåëíîñòè. Ñáîðíèê íàó÷íè òðóäîâå îò íàó÷íà êîíôåðåíöèÿ 2015 „Íîâèòå ïðåäèçâèêàòåëñòâà ïðåä ñèñòåìèòå çà èíôîðìàöèîííà ñèãóðíîñò“, Øóìåí 2015, ñ. 56-70. ISBN 978-954-9681-65-9. Ïëåíàðåí äîêëàä. |
19.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Äèñåðòàöèè
| Àâòîðåôåðàò êúì äèñåðòàöèîíåí òðóä íà òåìà "ÍÅÄÂÎÈ×ÍÈ ÏÑÅÂÄÎÑËÓ×ÀÉÍÈ ÏÎÑËÅÄÎÂÀÒÅËÍÎÑÒÈ - ÒÅÎÐÈß È ÏÐÈËÎÆÅÍÈÅ Â ÊÎÌÓÍÈÊÀÖÈÎÍÍÈÒÅ È ÊÎÌÏÞÒÚÐÍÈ ÌÐÅÆÈ È ÑÈÑÒÅÌÈ", 60 ñ., Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Äèñåðòàöèè
| Ïðèëîæåíèÿ êúì äèñåðòàöèîíåí òðóä íà òåìà "ÍÅÄÂÎÈ×ÍÈ ÏÑÅÂÄÎÑËÓ×ÀÉÍÈ ÏÎÑËÅÄÎÂÀÒÅËÍÎÑÒÈ - ÒÅÎÐÈß È ÏÐÈËÎÆÅÍÈÅ Â ÊÎÌÓÍÈÊÀÖÈÎÍÍÈÒÅ È ÊÎÌÏÞÒÚÐÍÈ ÌÐÅÆÈ È ÑÈÑÒÅÌÈ", 2020 ñ., Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Äèñåðòàöèè
| ÍÅÄÂÎÈ×ÍÈ ÏÑÅÂÄÎÑËÓ×ÀÉÍÈ ÏÎÑËÅÄÎÂÀÒÅËÍÎÑÒÈ - ÒÅÎÐÈß È ÏÐÈËÎÆÅÍÈÅ Â ÊÎÌÓÍÈÊÀÖÈÎÍÍÈÒÅ È ÊÎÌÏÞÒÚÐÍÈ ÌÐÅÆÈ È ÑÈÑÒÅÌÈ, 276 ñ., Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| Boyanov P., Zhaneta T., "An unauthorized penetration into computer system with activated firewall and antivirus software", Anniversary Scientific International Conference 45 Years Computer Sciences and Engineering Department 30 Years Computer Systems and Technologies Speciality, 27-28 September, 2013, ISSN 1312-3335, Varna, Bulgaria, Section 1 Computer systems and Networks, pp.41-46. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| Boyanov P. Kr., Tasheva Zh. N., Fetfov Og. M., Trifonov T. Sp., Uzunova B. Hr., Securing the social profiles from malicious and unauthorized access, Proceedings of the 10th International Conference on Bionics and Prosthetics, Biomechanics and Mechanics, Mechatronics and Robotics (ICBBM 2014), Liepaya, Latvia, ISBN 978-9934-10-573-9, Volume 10, June 2 - 7, 2014, pp. 109-112. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| Boyanov P, Kr., Tasheva Zh, N., "A comprehensive testing and analisys of the computer and network security vulnerabilities using the scanning program Nessus", International Conference on Bionics and Prosthetics, Biomechanics and Mechanics, Mechatronics and Robotics (ICBBM 2013), Riga - Latvia, LABPOTO - Latvia, ISBN 978-9934-8409-0-6, Volume 9, June 17 - 21, 2013, pp.162-165. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| Òàøåâà Æ. Í., Áîÿíîâ Ï. Êð., "Ñðàâíèòåëåí àíàëèç íà çëîíàìåðåíè óåá-áàçèðàíè àòàêè", Íàó÷íà êîíôåðåíöèÿ íà òåìà „Çàùèòàòà íà ëè÷íèòå äàííè â êîíòåêñòà íà èíôîðìàöèîííàòà ñèãóðíîñò”, Ôàêóëòåò "Àðòèëåðèÿ, ÏÂÎ è ÊÈÑ" ïðè Íàöèîíàëíèÿò âîåíåí óíèâåðñèòåò „Âàñèë Ëåâñêè”, ãð. Øóìåí, Áúëãðàèÿ, ISBN 978-954-9681-49-9, 6 - 7 Þíè 2013, ñòð. 178-183. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| Òàøåâà Æ. Í., Èíôîðìàöèîííè òåõíîëîãèè çà ñèãóðíîñò, Èçäàòåëñòâî íà ÍÂÓ „Âàñèë Ëåâñêè, ISBN 978-954-753-190-1, 2014, 176 ñ. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| Òàøåâà Æ. Í., Õàðäóåðíè è ñîôòóåðíè ñðåäñòâà çà èíôîðìàöèîííà ñèãóðíîñò, Èçäàòåëñòâî íà ÍÂÓ „Âàñèë Ëåâñêè, ISBN 978-954-753-188-8, 2014, 136 ñ. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| Òàøåâà Æ. Í., Ð. À. Áîãäàíîâ, Òåõíîëîãè÷íè ðåøåíèÿ çà èíôîðìàöèîííà ñèãóðíîñò, Èçäàòåëñòâî íà ÍÂÓ „Âàñèë Ëåâñêè, ISBN 978-954-753-130-7, 2013, 110 ñ. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| Òàøåâà, À., Æ.Òàøåâà. Ñèñòåìà çà ñêðèâàíå íà êîíôèäåíöèàëíà èíôîðìàöèÿ ÷ðåç êîìáèíèðàíî èçïîëçâàíå íà êðèïòîãðàôñêè è ñòåãàíîãðàôñêè ìåòîäè. Òðóäîâå íà „Õåìóñ-2012“, Ïëîâäèâ, 2012. Öèòèðàíî â: Ñòîÿíîâà, Â. "Âúçìîæíîñòè çà ïîäîáðÿâàíå íà ñêðèòîñòòà íà ïðåäàâàíåòî íà èíôîðìàöèÿòà â êîìóíèêàöèîííî- èíôîðìàöèîííèòå ñèñòåìè ÷ðåç èçïîëçâàíå íà ñòåãàíîãðàôñêè ìåòîäè " Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Ñòîÿíîâà, Â. "Âúçìîæíîñòè çà ïîäîáðÿâàíå íà ñêðèòîñòòà íà ïðåäàâàíåòî íà èíôîðìàöèÿòà â êîìóíèêàöèîííî- èíôîðìàöèîííèòå ñèñòåìè ÷ðåç èçïîëçâàíå íà ñòåãàíîãðàôñêè ìåòîäè " Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Boyanov, Petar. "SCANNING AND MONITORING ONE HTTP SERVER AND SEVERAL HOSTS IN WIRELESS LOCAL AREA NETWORK FOR SECURITY ISSUES." ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH 4 (2015): 50. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Boyanov, Petar. "DESIGNING A SMALL CORPORATE BUILDING WITH FOUR WORKING COMPUTER DEPARTMENTS USING STATIC ROUTING AND SUBNETTING." Association Scientific and Applied Research 7 (2015): 43. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Boyanov, Petar. "DESIGNING A SMALL CORPORATE BUILDING WITH FOUR WORKING COMPUTER DEPARTMENTS USING DISTANCE VECTOR ROUTING PROTOCOL-RIP." Association Scientific and Applied Research 7 (2015): 52. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Boyanov, P. (2015). DETECTION AND IMPLEMENTATION OF ALTERNATE DATA STREAMS IN THE COMPUTER AND NETWORK SYSTEMS.Association Scientific and Applied Research, 7, 34. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Tasheva, A. T., Tasheva, Z. N., & Milev, A. P. (2011). Generalization of the self-shrinking generator in the galois field GF (pn). Advances in Artificial Intelligence, 2011, 2. Öèòèðàíî â: Sundaresan, Saravanan, Robin Doss, and Wanlei Zhou. "Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags." IEEE Transactions on Computers Volume:64, Issue: 10. (2015): 2994 – 3008. Impact factor: 1,659. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Tasheva, A. T., Tasheva, Z. N., & Milev, A. P. (2011). Generalization of the self-shrinking generator in the galois field GF (pn). Advances in Artificial Intelligence, 2011, 2. Öèòèðàíî â: Sundaresan, Saravanan, et al. "Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy." Computer Communications 55 (2015): 112-124. Elsivier. Impact factor: 1,895. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Tasheva, A. T., Tasheva, Z. N., & Milev, A. P. (2011). Generalization of the self-shrinking generator in the galois field GF (pn). Advances in Artificial Intelligence, 2011, 2. Öèòèðàíî â: Sundaresan, Saravanan, et al. "Secure tag search in rfid systems using mobile readers." Dependable and Secure Computing, IEEE Transactions on 12.2 (2015): 230-242. doi: 10.1109/TDSC.2014.2302305. Impact Factor: 1.352, 5-Year Impact Factor: 1.330, Source Normalized Impact per Paper (SNIP): 2.098, SCImago Journal Rank (SJR): 0.645. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ
| Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: Ms_BJMCS_22159 „A review of SMS security using hybrid cryptography and use in mobile money system “ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Mathematics & Computer Science. – Ñåðòèôèêàò. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ
| Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: 2015_AJOMCOR_1150 „ Performance, Security and Statistical Analysis of Nimbe Cipher 1 (NC1)“ çà ìåæäóíàðîäíî ñïèñàíèå Asian Journal of Mathematics and Computer Research. – Ñåðòèôèêàò. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ
| Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: Ms_BJMCS_19442 „ Construction of Maximum period Linear Feedback Shift Registers (LFSR) (Primitive polynomials and linear recurring relations)“ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Mathematics & Computer Science. – Ñåðòèôèêàò. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Äîêëàäè
| Stoyanova V, Tasheva Zh. Research of the characteristics of a steganography algorithm based on LSB method of embedding information in images. In Proceedings of International Scientific Technical Conference Technics. Technologies. Education. Safety ’15, Vol. 2, Information Technologies, Natural and Mathematical Sciences. 2015. pp. 56-59. ISSN: 1310 – 3946. 08-10. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Äîêëàäè
| Tasheva A., Zh. Tasheva. Algorithms for Building Extended Galois Field and Calculations in it. Proceedings of International Scientific Conference Computer Science’2015, 2015, pp. 133-138. ISBN: 978-619-167-177-9. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Ôåòôîâ Î., Áîÿíîâ Ï., Íèêîëîâ Èâ., Òàøåâà Æ., Òðèôîíîâ Ò., Ñðàâíèòåëåí àíàëèç íà ñúâðåìåííèòå âèäîâå áåçæè÷íè IP âèäåîêàìåðè â êîìïþòúðíèòå ìðåæè çà íàáëþäåíèå è êîíòðîë, Annual of Konstantin Preslavsky University of Shumen, Shumen, 2015 (ïîä ïå÷àò). |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Ôåòôîâ Î., Áîÿíîâ Ï., Òàøåâà Æ., Òðèôîíîâ Ò., Ñðàâíèòåëåí àíàëèç íà ñúâðåìåííèòå âèäîâå àíòèâèðóñíè ïðîãðàìè, Annual of Konstantin Preslavsky University of Shumen, Shumen, 2015 (ïîä ïå÷àò). |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Ôåòôîâ Î., Áîÿíîâ Ï., Òàøåâà Æ., Òðèôîíîâ Ò., Ñðàâíèòåëåí àíàëèç íà ñúâðåìåííèòå âèäîâå óÿçâèìîñòè è åêñïëîéòè â êîìïþòúðíèòå ìðåæè è ñèñòåìè, Annual of Konstantin Preslavsky University of Shumen, Shumen, 2015 (ïîä ïå÷àò). |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ãîäèøíèê
| Ñòàòèè
| Áîÿíîâ Ï., Òàøåâà Æ., Òðèôîíîâ Ò., Íèêîëîâ Èâ., Èçñëåäâàíå íà ñèãóðíîñòòà íà áåçæè÷íà ëîêàëíà êîìïþòúðíà ìðåæà, Annual of Konstantin Preslavsky University of Shumen, Shumen, 2015 (ïîä ïå÷àò). |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Òàøåâà Æ. Í. Ñëåäâàùî ïîêîëåíèå êèáåðñèãóðíîñò - ïðåäâèæäàíå íà çàïëàõèòå. CIO, áð. 7. 2015, ñòð. 51-53. |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Savova-Tasheva, Z., and Tasheva, A., Algorithms for Extended Galois Field Generation and Calculation. Mathematical and Software Engineering. Vol 1, No 1, 2015, pp. 18-24. ISSN: 2367-7449 |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Tasheva, Z. N. On Linear Complexity of Generalized Shrinking-Multiplexing Generator. Journal of Basic and Applied Research. Vol. 4, Issue. 1, pp. 8-17. ISSN 2395-3446 (Online). |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Tasheva, Z. N. On Linear Complexity of Generalized Shrinking-Multiplexing Generator. Journal of Basic and Applied Research. Vol. 4, Issue. 1, pp. 8-17. ISSN 2395-3438 (Print) |
18.11.2015 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ñáîðíèê
| Ñòàòèè
| Òàøåâà, Æ. Í. Ãåíåðèðàíå íà p-è÷íè êîäîâå íà Ðèéä-Ñîëîìîí. Mattex 2014. Øóìåí. ïîä ïå÷àò. |
26.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ
| Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: 2014_BJAST_14762 „LFCSR: a novel cryptographic primitive based on FCSR“ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Applied Science & Technology. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ
| Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: 2013_BJMCS_8123 „Fibonacci Random Number Generator using Lehmer’s Algorithm“ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Mathematics & Computer Science. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ñáîðíèê
| Ñòàòèè
| Òàøåâà, Æ. Í., Áîãäàíîâ, Ð. À. Àíîíèìíà ñèñòåìà çà êîìóíèêàöèè â êèáåðïðîñòðàíñòâîòî, èçïîëçâàùà ïðîòîêîëà Tor. Ñáîðíèê îò Íàó÷íà êîíôåðåíöèÿ „Íîâàòà ïàðàäèãìà çà ñèãóðíîñò â êèáåðïðîñòðàíñòâîòî“, 5 - 6 þíè 2014 ã, Øóìåí. ïîä ïå÷àò. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 íàó÷íî ñïèñàíèå
| Ñòàòèè
| Òàøåâà, Æ. Í. Ïðåäèçâèêàòåëñòâà êúì ñèãóðíîñòòà íà ñúâðåìåííèòå èíôîðìàöèîííè ñèñòåìè. CIO. áð. 7, 2014, ñòð. 55-58. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Tasheva, A. T., Tasheva Z. N., Nakov 0. Software Stream Cipher based on pGSSG Generator. International Journal of Cyber-Security and Digital Forensics (IJCSDF). Vol. 3. No 2. Kowloon, Hong Kong. ISSN 2305-0012, pp. 111-121. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Tasheva Z. N., Tasheva, A. T. Randomness Testing of Sequences Produced by p-ary Generalized Self-Shrinking Generator Using Approximate Entropy. Journal Scientific and Applied Research, vol. 5, 2014. ISSN 1314-6289, pp. 76-84. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Zhaneta Tasheva, A Short Survey of p-ary Pseudo-Random Sequences, Journal Science Education Innovation, Volume 2, 2014. Association Scientific and Applied Research International Journal, pp. 17-26. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Tasheva, Zhaneta, Borislav Bedzhev, and Borislav Stoyanov. “N-adic Summation-Shrinking Generator.” Basic properties and empirical evidence, http://eprint. iacr. org 68, 2005. Öèòèðàíî â: Li, F., Hu, H., & Zhu, S. (2014). FCSR periodic multisequences with maximal joint N-adic complexity and large k-error joint N-adic complexity over Z/(N). Journal of Systems Science and Complexity, 27(2), 370-381. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Tasheva, Zh, B. Bedzhev, and B. Stoyanov. “Self-shrinking p-adic cryptographic generator.” In XL International Scientific Conference on Information, Communication and Energy Systems and Technologies, ICEST, pp. 7-10. 2005. Öèòèðàíî â: B. Stoyanov, K. Kordov. Pseudorandom Bit Generator with Parallel Implementation, Large-Scale Scientific Computing, Lecture Notes in Computer Science 2014, Jun 2014, pp 557-564. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| [20] A. T. Tasheva, Z. N. Tasheva, and A. P. Milev, “Generalization of the self-shrinking generator in the galois field GFpn,” Adv. Artif. Intell., vol. 2011, pp. 1–10, Jan. 2011. Öèòèðàíî â: Sundaresan, S., Doss, R., Zhou, W., and Piramuthu, S.. Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Computer Communications. 2014. Source Normalized Impact per Paper (SNIP): 2.098, SCImago Journal Rank (SJR): 0.645, Impact Factor: 1.352, 5-Year Impact Factor: 1.330. |
25.11.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ñáîðíèê
| Ñòàòèè
| Boyanov P. Kr., Tasheva Zh. N., Fetfov Og. M., Trifonov T. Sp., Uzunova B. Hr., Securing the social profiles from malicious and unauthorized access, Proceedings of the 10th International Conference on Bionics and Prosthetics, Biomechanics and Mechanics, Mechatronics and Robotics (ICBBM 2014), Liepaya, Latvia, ISBN 978-9934-10-573-9, Volume 10, June 2 - 7, 2014, pp. 109-112. |
19.06.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Bedzhev, Borislav Y., Zhaneta N. Tasheva, and Valentin A. Mutkov. “CDMA codes for the next generation mobile communication systems.” Conference proceedings of XII international symposium of theoretical electrical engineering ISTET 03, Warsaw, Poland. Vol. 1. 2003.
Öèòèðàíî â:
A Lazarov, PT Kostadinov, PD Minchev, Bistatic SAR/ISAR/FSR: Theory Algorithms and Program Implementation, John Wiley & Sons, Inc. January 2014, ISBN: 978-1-84821-574-0, ps. 192. |
13.06.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| [17] Tasheva A. T., Tasheva, Zh. N., Milev, A. P., Generalization of the Self-Shrinking Generator in the Galois Field GF(pn), Advances in Artificial Intelligence, vol. 2011, Article ID 464971, 10 pages, 2011. doi:10.1155/2011/464971.
Öèòèðàíî â:
Antoniya Tasheva, Ognyan Nakov, Boyan Petrov. Determining the Secrecy of Software Encryption System based on pGSSG Generator using Shannon Entropy. Proceedings of the International conference on Computing Technology and Information Management, Dubai, UAE, 2014. ISBN: 978-0-9891305-5-4. pp. 302-308. |
13.06.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| [14] Tashev, T., Bedzhev, B., Tasheva, Zh. The Generalized Shrinking-Multiplexing Generator, ACM International Conference Proceeding Series 285, Article number 48, Proceedings of the 2007 international conference on Computer systems and technologies CompSysTech ‘07, 2007.
Öèòèðàíî â:
Antoniya Tasheva, Ognyan Nakov, Boyan Petrov. Determining the Secrecy of Software Encryption System based on pGSSG Generator using Shannon Entropy. Proceedings of the International conference on Computing Technology and Information Management, Dubai, UAE, 2014. ISBN: 978-0-9891305-5-4. pp. 302-308.
|
13.06.2014 |
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
|
Äðóãè
| Öèòèðàíèÿ
| [1] Bedzhev, Borislav.Y, dkk. An Algorithm for Synthesis of Aperiodic Optical Orthogonal Codes. International Conference on Computer Systems and Technologies – CompSysTech. 2005
Öèòèðàíî â:
Wulandari, S. A., Hidayatno, A., and Santoso, I.. PERBANDINGAN KINERJA SISTEM CDMA OPTIK KOHEREN DAN INKOHEREN PADA SISTEM SINKRON DAN ASINKRON BERDASARKAN PENGKODEAN OPTIK (Doctoral dissertation, Jurusan Teknik Elektro Fakultas Teknik Undip). 2011. |
13.06.2014 |