print
Òúðñè Îáùà ñòàòèñòèêà Ïðåïîäàâàòåëè
string(3) "387"
ÔÒÍ / ÊÎÌÓÍÈÊÀÖÈÎÍÍÀ È ÊÎÌÏÞÒÚÐÍÀ ÒÅÕÍÈÊÀ / Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà
Ñòðàíèöà: 1/3,îáùî çàïèñè:129
íàïðåä
Àâòîð Òèï Êàòåãîðèÿ Ïóáëèêàöèÿ Ðåäàêöèÿ
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: Ms_BJMCS_23924 „ Analysis of attacks and security issues on the peer-to-peer networks“ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Mathematics & Computer Science. – Ñåðòèôèêàò. 22.02.2016
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Äîêëàäè Ñàâîâà-Òàøåâà, Æ. Í. Îáîáùåí ñàìîñâèâàù ãåíåðàòîð íà ïñåâäîñëó÷àéíè ïîñëåäîâàòåëíîñòè. Ñáîðíèê íàó÷íè òðóäîâå îò íàó÷íà êîíôåðåíöèÿ 2015 „Íîâèòå ïðåäèçâèêàòåëñòâà ïðåä ñèñòåìèòå çà èíôîðìàöèîííà ñèãóðíîñò“, Øóìåí 2015, ñ. 56-70. ISBN 978-954-9681-65-9. Ïëåíàðåí äîêëàä. 19.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Äèñåðòàöèè Àâòîðåôåðàò êúì äèñåðòàöèîíåí òðóä íà òåìà "ÍÅÄÂÎÈ×ÍÈ ÏÑÅÂÄÎÑËÓ×ÀÉÍÈ ÏÎÑËÅÄÎÂÀÒÅËÍÎÑÒÈ - ÒÅÎÐÈß È ÏÐÈËÎÆÅÍÈÅ Â ÊÎÌÓÍÈÊÀÖÈÎÍÍÈÒÅ È ÊÎÌÏÞÒÚÐÍÈ ÌÐÅÆÈ È ÑÈÑÒÅÌÈ", 60 ñ., Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Äèñåðòàöèè Ïðèëîæåíèÿ êúì äèñåðòàöèîíåí òðóä íà òåìà "ÍÅÄÂÎÈ×ÍÈ ÏÑÅÂÄÎÑËÓ×ÀÉÍÈ ÏÎÑËÅÄÎÂÀÒÅËÍÎÑÒÈ - ÒÅÎÐÈß È ÏÐÈËÎÆÅÍÈÅ Â ÊÎÌÓÍÈÊÀÖÈÎÍÍÈÒÅ È ÊÎÌÏÞÒÚÐÍÈ ÌÐÅÆÈ È ÑÈÑÒÅÌÈ", 2020 ñ., Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Äèñåðòàöèè ÍÅÄÂÎÈ×ÍÈ ÏÑÅÂÄÎÑËÓ×ÀÉÍÈ ÏÎÑËÅÄÎÂÀÒÅËÍÎÑÒÈ - ÒÅÎÐÈß È ÏÐÈËÎÆÅÍÈÅ Â ÊÎÌÓÍÈÊÀÖÈÎÍÍÈÒÅ È ÊÎÌÏÞÒÚÐÍÈ ÌÐÅÆÈ È ÑÈÑÒÅÌÈ, 276 ñ., Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ Boyanov P., Zhaneta T., "An unauthorized penetration into computer system with activated firewall and antivirus software", Anniversary Scientific International Conference 45 Years Computer Sciences and Engineering Department 30 Years Computer Systems and Technologies Speciality, 27-28 September, 2013, ISSN 1312-3335, Varna, Bulgaria, Section 1 Computer systems and Networks, pp.41-46. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ Boyanov P. Kr., Tasheva Zh. N., Fetfov Og. M., Trifonov T. Sp., Uzunova B. Hr., Securing the social profiles from malicious and unauthorized access, Proceedings of the 10th International Conference on Bionics and Prosthetics, Biomechanics and Mechanics, Mechatronics and Robotics (ICBBM 2014), Liepaya, Latvia, ISBN 978-9934-10-573-9, Volume 10, June 2 - 7, 2014, pp. 109-112. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ Boyanov P, Kr., Tasheva Zh, N., "A comprehensive testing and analisys of the computer and network security vulnerabilities using the scanning program Nessus", International Conference on Bionics and Prosthetics, Biomechanics and Mechanics, Mechatronics and Robotics (ICBBM 2013), Riga - Latvia, LABPOTO - Latvia, ISBN 978-9934-8409-0-6, Volume 9, June 17 - 21, 2013, pp.162-165. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ Òàøåâà Æ. Í., Áîÿíîâ Ï. Êð., "Ñðàâíèòåëåí àíàëèç íà çëîíàìåðåíè óåá-áàçèðàíè àòàêè", Íàó÷íà êîíôåðåíöèÿ íà òåìà „Çàùèòàòà íà ëè÷íèòå äàííè â êîíòåêñòà íà èíôîðìàöèîííàòà ñèãóðíîñò”, Ôàêóëòåò "Àðòèëåðèÿ, ÏÂÎ è ÊÈÑ" ïðè Íàöèîíàëíèÿò âîåíåí óíèâåðñèòåò „Âàñèë Ëåâñêè”, ãð. Øóìåí, Áúëãðàèÿ, ISBN 978-954-9681-49-9, 6 - 7 Þíè 2013, ñòð. 178-183. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ Òàøåâà Æ. Í., Èíôîðìàöèîííè òåõíîëîãèè çà ñèãóðíîñò, Èçäàòåëñòâî íà ÍÂÓ „Âàñèë Ëåâñêè, ISBN 978-954-753-190-1, 2014, 176 ñ. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ Òàøåâà Æ. Í., Õàðäóåðíè è ñîôòóåðíè ñðåäñòâà çà èíôîðìàöèîííà ñèãóðíîñò, Èçäàòåëñòâî íà ÍÂÓ „Âàñèë Ëåâñêè, ISBN 978-954-753-188-8, 2014, 136 ñ. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ Òàøåâà Æ. Í., Ð. À. Áîãäàíîâ, Òåõíîëîãè÷íè ðåøåíèÿ çà èíôîðìàöèîííà ñèãóðíîñò, Èçäàòåëñòâî íà ÍÂÓ „Âàñèë Ëåâñêè, ISBN 978-954-753-130-7, 2013, 110 ñ. Öèòèðàíî â: Áîÿíîâ, Ï. „Àíàëèç è ïðîòèâîäåéñòâèå íà îïèòè çà íåîòîðèçèðàí äîñòúï äî ðåñóðñèòå íà êîìïþòúðíèòå ìðåæè“, Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ Òàøåâà, À., Æ.Òàøåâà. Ñèñòåìà çà ñêðèâàíå íà êîíôèäåíöèàëíà èíôîðìàöèÿ ÷ðåç êîìáèíèðàíî èçïîëçâàíå íà êðèïòîãðàôñêè è ñòåãàíîãðàôñêè ìåòîäè. Òðóäîâå íà „Õåìóñ-2012“, Ïëîâäèâ, 2012. Öèòèðàíî â: Ñòîÿíîâà, Â. "Âúçìîæíîñòè çà ïîäîáðÿâàíå íà ñêðèòîñòòà íà ïðåäàâàíåòî íà èíôîðìàöèÿòà â êîìóíèêàöèîííî- èíôîðìàöèîííèòå ñèñòåìè ÷ðåç èçïîëçâàíå íà ñòåãàíîãðàôñêè ìåòîäè " Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Ñòîÿíîâà, Â. "Âúçìîæíîñòè çà ïîäîáðÿâàíå íà ñêðèòîñòòà íà ïðåäàâàíåòî íà èíôîðìàöèÿòà â êîìóíèêàöèîííî- èíôîðìàöèîííèòå ñèñòåìè ÷ðåç èçïîëçâàíå íà ñòåãàíîãðàôñêè ìåòîäè " Äèñåðòàöèîíåí òðóä çà ïðèäîáèâàíå íà ÎÍÑ ‚äîêòîð“. Øóìåí, 2015. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Boyanov, Petar. "SCANNING AND MONITORING ONE HTTP SERVER AND SEVERAL HOSTS IN WIRELESS LOCAL AREA NETWORK FOR SECURITY ISSUES." ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH 4 (2015): 50. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Boyanov, Petar. "DESIGNING A SMALL CORPORATE BUILDING WITH FOUR WORKING COMPUTER DEPARTMENTS USING STATIC ROUTING AND SUBNETTING." Association Scientific and Applied Research 7 (2015): 43. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Boyanov, Petar. "DESIGNING A SMALL CORPORATE BUILDING WITH FOUR WORKING COMPUTER DEPARTMENTS USING DISTANCE VECTOR ROUTING PROTOCOL-RIP." Association Scientific and Applied Research 7 (2015): 52. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Tasheva, Z., & Tasheva, A. (2013). COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY IN SOFTWARE SYSTEM FOR HIDING CONFIDENTIAL INFORMATION. ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH, 1, 84. Öèòèðàíî â: Boyanov, P. (2015). DETECTION AND IMPLEMENTATION OF ALTERNATE DATA STREAMS IN THE COMPUTER AND NETWORK SYSTEMS.Association Scientific and Applied Research, 7, 34. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Tasheva, A. T., Tasheva, Z. N., & Milev, A. P. (2011). Generalization of the self-shrinking generator in the galois field GF (pn). Advances in Artificial Intelligence, 2011, 2. Öèòèðàíî â: Sundaresan, Saravanan, Robin Doss, and Wanlei Zhou. "Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags." IEEE Transactions on Computers Volume:64, Issue: 10. (2015): 2994 – 3008. Impact factor: 1,659. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Tasheva, A. T., Tasheva, Z. N., & Milev, A. P. (2011). Generalization of the self-shrinking generator in the galois field GF (pn). Advances in Artificial Intelligence, 2011, 2. Öèòèðàíî â: Sundaresan, Saravanan, et al. "Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy." Computer Communications 55 (2015): 112-124. Elsivier. Impact factor: 1,895. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Tasheva, A. T., Tasheva, Z. N., & Milev, A. P. (2011). Generalization of the self-shrinking generator in the galois field GF (pn). Advances in Artificial Intelligence, 2011, 2. Öèòèðàíî â: Sundaresan, Saravanan, et al. "Secure tag search in rfid systems using mobile readers." Dependable and Secure Computing, IEEE Transactions on 12.2 (2015): 230-242. doi: 10.1109/TDSC.2014.2302305. Impact Factor: 1.352, 5-Year Impact Factor: 1.330, Source Normalized Impact per Paper (SNIP): 2.098, SCImago Journal Rank (SJR): 0.645. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: Ms_BJMCS_22159 „A review of SMS security using hybrid cryptography and use in mobile money system “ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Mathematics & Computer Science. – Ñåðòèôèêàò. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: 2015_AJOMCOR_1150 „ Performance, Security and Statistical Analysis of Nimbe Cipher 1 (NC1)“ çà ìåæäóíàðîäíî ñïèñàíèå Asian Journal of Mathematics and Computer Research. – Ñåðòèôèêàò. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: Ms_BJMCS_19442 „ Construction of Maximum period Linear Feedback Shift Registers (LFSR) (Primitive polynomials and linear recurring relations)“ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Mathematics & Computer Science. – Ñåðòèôèêàò. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Äîêëàäè Stoyanova V, Tasheva Zh. Research of the characteristics of a steganography algorithm based on LSB method of embedding information in images. In Proceedings of International Scientific Technical Conference Technics. Technologies. Education. Safety ’15, Vol. 2, Information Technologies, Natural and Mathematical Sciences. 2015. pp. 56-59. ISSN: 1310 – 3946. 08-10. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Äîêëàäè Tasheva A., Zh. Tasheva. Algorithms for Building Extended Galois Field and Calculations in it. Proceedings of International Scientific Conference Computer Science’2015, 2015, pp. 133-138. ISBN: 978-619-167-177-9. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Ñòàòèè Ôåòôîâ Î., Áîÿíîâ Ï., Íèêîëîâ Èâ., Òàøåâà Æ., Òðèôîíîâ Ò., Ñðàâíèòåëåí àíàëèç íà ñúâðåìåííèòå âèäîâå áåçæè÷íè IP âèäåîêàìåðè â êîìïþòúðíèòå ìðåæè çà íàáëþäåíèå è êîíòðîë, Annual of Konstantin Preslavsky University of Shumen, Shumen, 2015 (ïîä ïå÷àò). 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Ñòàòèè Ôåòôîâ Î., Áîÿíîâ Ï., Òàøåâà Æ., Òðèôîíîâ Ò., Ñðàâíèòåëåí àíàëèç íà ñúâðåìåííèòå âèäîâå àíòèâèðóñíè ïðîãðàìè, Annual of Konstantin Preslavsky University of Shumen, Shumen, 2015 (ïîä ïå÷àò). 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Ñòàòèè Ôåòôîâ Î., Áîÿíîâ Ï., Òàøåâà Æ., Òðèôîíîâ Ò., Ñðàâíèòåëåí àíàëèç íà ñúâðåìåííèòå âèäîâå óÿçâèìîñòè è åêñïëîéòè â êîìïþòúðíèòå ìðåæè è ñèñòåìè, Annual of Konstantin Preslavsky University of Shumen, Shumen, 2015 (ïîä ïå÷àò). 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ãîäèøíèê Ñòàòèè Áîÿíîâ Ï., Òàøåâà Æ., Òðèôîíîâ Ò., Íèêîëîâ Èâ., Èçñëåäâàíå íà ñèãóðíîñòòà íà áåçæè÷íà ëîêàëíà êîìïþòúðíà ìðåæà, Annual of Konstantin Preslavsky University of Shumen, Shumen, 2015 (ïîä ïå÷àò). 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè Òàøåâà Æ. Í. Ñëåäâàùî ïîêîëåíèå êèáåðñèãóðíîñò - ïðåäâèæäàíå íà çàïëàõèòå. CIO, áð. 7. 2015, ñòð. 51-53. 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè Savova-Tasheva, Z., and Tasheva, A., Algorithms for Extended Galois Field Generation and Calculation. Mathematical and Software Engineering. Vol 1, No 1, 2015, pp. 18-24. ISSN: 2367-7449 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè Tasheva, Z. N. On Linear Complexity of Generalized Shrinking-Multiplexing Generator. Journal of Basic and Applied Research. Vol. 4, Issue. 1, pp. 8-17. ISSN 2395-3446 (Online). 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè Tasheva, Z. N. On Linear Complexity of Generalized Shrinking-Multiplexing Generator. Journal of Basic and Applied Research. Vol. 4, Issue. 1, pp. 8-17. ISSN 2395-3438 (Print) 18.11.2015
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ñáîðíèê Ñòàòèè Òàøåâà, Æ. Í. Ãåíåðèðàíå íà p-è÷íè êîäîâå íà Ðèéä-Ñîëîìîí. Mattex 2014. Øóìåí. ïîä ïå÷àò. 26.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: 2014_BJAST_14762 „LFCSR: a novel cryptographic primitive based on FCSR“ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Applied Science & Technology. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ðåôåðèðàíè èçäàíèÿ Ïóáëèêóâàíè ðåöåíçèè, ñòàíîâèùà è îòçèâè â íàó÷íè/àêàäåìè÷íè ñïèñàíèÿ Ðåöåíçèÿ íà ñòàòèÿ Manuscript Number: 2013_BJMCS_8123 „Fibonacci Random Number Generator using Lehmer’s Algorithm“ çà ìåæäóíàðîäíî ñïèñàíèå British Journal of Mathematics & Computer Science. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  ñáîðíèê Ñòàòèè Òàøåâà, Æ. Í., Áîãäàíîâ, Ð. À. Àíîíèìíà ñèñòåìà çà êîìóíèêàöèè â êèáåðïðîñòðàíñòâîòî, èçïîëçâàùà ïðîòîêîëà Tor. Ñáîðíèê îò Íàó÷íà êîíôåðåíöèÿ „Íîâàòà ïàðàäèãìà çà ñèãóðíîñò â êèáåðïðîñòðàíñòâîòî“, 5 - 6 þíè 2014 ã, Øóìåí. ïîä ïå÷àò. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà  íàó÷íî ñïèñàíèå Ñòàòèè Òàøåâà, Æ. Í. Ïðåäèçâèêàòåëñòâà êúì ñèãóðíîñòòà íà ñúâðåìåííèòå èíôîðìàöèîííè ñèñòåìè. CIO. áð. 7, 2014, ñòð. 55-58. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè Tasheva, A. T., Tasheva Z. N., Nakov 0. Software Stream Cipher based on pGSSG Generator. International Journal of Cyber-Security and Digital Forensics (IJCSDF). Vol. 3. No 2. Kowloon, Hong Kong. ISSN 2305-0012, pp. 111-121. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè Tasheva Z. N., Tasheva, A. T. Randomness Testing of Sequences Produced by p-ary Generalized Self-Shrinking Generator Using Approximate Entropy. Journal Scientific and Applied Research, vol. 5, 2014. ISSN 1314-6289, pp. 76-84. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè Zhaneta Tasheva, A Short Survey of p-ary Pseudo-Random Sequences, Journal Science Education Innovation, Volume 2, 2014. Association Scientific and Applied Research International Journal, pp. 17-26. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Tasheva, Zhaneta, Borislav Bedzhev, and Borislav Stoyanov. “N-adic Summation-Shrinking Generator.” Basic properties and empirical evidence, http://eprint. iacr. org 68, 2005. Öèòèðàíî â: Li, F., Hu, H., & Zhu, S. (2014). FCSR periodic multisequences with maximal joint N-adic complexity and large k-error joint N-adic complexity over Z/(N). Journal of Systems Science and Complexity, 27(2), 370-381. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Tasheva, Zh, B. Bedzhev, and B. Stoyanov. “Self-shrinking p-adic cryptographic generator.” In XL International Scientific Conference on Information, Communication and Energy Systems and Technologies, ICEST, pp. 7-10. 2005. Öèòèðàíî â: B. Stoyanov, K. Kordov. Pseudorandom Bit Generator with Parallel Implementation, Large-Scale Scientific Computing, Lecture Notes in Computer Science 2014, Jun 2014, pp 557-564. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Ñ èìïàêò ôàêòîð Öèòèðàíèÿ [20] A. T. Tasheva, Z. N. Tasheva, and A. P. Milev, “Generalization of the self-shrinking generator in the galois field GFpn,” Adv. Artif. Intell., vol. 2011, pp. 1–10, Jan. 2011. Öèòèðàíî â: Sundaresan, S., Doss, R., Zhou, W., and Piramuthu, S.. Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Computer Communications. 2014. Source Normalized Impact per Paper (SNIP): 2.098, SCImago Journal Rank (SJR): 0.645, Impact Factor: 1.352, 5-Year Impact Factor: 1.330. 25.11.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ñáîðíèê Ñòàòèè Boyanov P. Kr., Tasheva Zh. N., Fetfov Og. M., Trifonov T. Sp., Uzunova B. Hr., Securing the social profiles from malicious and unauthorized access, Proceedings of the 10th International Conference on Bionics and Prosthetics, Biomechanics and Mechanics, Mechatronics and Robotics (ICBBM 2014), Liepaya, Latvia, ISBN 978-9934-10-573-9, Volume 10, June 2 - 7, 2014, pp. 109-112. 19.06.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Bedzhev, Borislav Y., Zhaneta N. Tasheva, and Valentin A. Mutkov. “CDMA codes for the next generation mobile communication systems.” Conference proceedings of XII international symposium of theoretical electrical engineering ISTET 03, Warsaw, Poland. Vol. 1. 2003. Öèòèðàíî â: A Lazarov, PT Kostadinov, PD Minchev, Bistatic SAR/ISAR/FSR: Theory Algorithms and Program Implementation, John Wiley & Sons, Inc. January 2014, ISBN: 978-1-84821-574-0, ps. 192. 13.06.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ [17] Tasheva A. T., Tasheva, Zh. N., Milev, A. P., Generalization of the Self-Shrinking Generator in the Galois Field GF(pn), Advances in Artificial Intelligence, vol. 2011, Article ID 464971, 10 pages, 2011. doi:10.1155/2011/464971. Öèòèðàíî â: Antoniya Tasheva, Ognyan Nakov, Boyan Petrov. Determining the Secrecy of Software Encryption System based on pGSSG Generator using Shannon Entropy. Proceedings of the International conference on Computing Technology and Information Management, Dubai, UAE, 2014. ISBN: 978-0-9891305-5-4. pp. 302-308. 13.06.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ [14] Tashev, T., Bedzhev, B., Tasheva, Zh. The Generalized Shrinking-Multiplexing Generator, ACM International Conference Proceeding Series 285, Article number 48, Proceedings of the 2007 international conference on Computer systems and technologies CompSysTech ‘07, 2007. Öèòèðàíî â: Antoniya Tasheva, Ognyan Nakov, Boyan Petrov. Determining the Secrecy of Software Encryption System based on pGSSG Generator using Shannon Entropy. Proceedings of the International conference on Computing Technology and Information Management, Dubai, UAE, 2014. ISBN: 978-0-9891305-5-4. pp. 302-308. 13.06.2014
Õîí. ïðîô. ä.ò.í. èíæ. Æàíåòà Íèêîëîâà Ñàâîâà Äðóãè Öèòèðàíèÿ [1] Bedzhev, Borislav.Y, dkk. An Algorithm for Synthesis of Aperiodic Optical Orthogonal Codes. International Conference on Computer Systems and Technologies – CompSysTech. 2005 Öèòèðàíî â: Wulandari, S. A., Hidayatno, A., and Santoso, I.. PERBANDINGAN KINERJA SISTEM CDMA OPTIK KOHEREN DAN INKOHEREN PADA SISTEM SINKRON DAN ASINKRON BERDASARKAN PENGKODEAN OPTIK (Doctoral dissertation, Jurusan Teknik Elektro Fakultas Teknik Undip). 2011. 13.06.2014
Ñòðàíèöà2: 1/3,îáùî çàïèñè:129