Tsvetoslava Vateva-Gurova

According to our database1, Tsvetoslava Vateva-Gurova authored at least 21 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Analysis and Detection of Cache-Based Exploits.
PhD thesis, 2020

2019
Security Requirements Engineering in Safety-Critical Railway Signalling Networks.
Secur. Commun. Networks, 2019

2018
Securing the cloud-assisted smart grid.
Int. J. Crit. Infrastructure Prot., 2018

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level.
Proceedings of the Information and Operational Technology Security Systems, 2018

Threat Modeling the Cloud: An Ontology Based Approach.
Proceedings of the Information and Operational Technology Security Systems, 2018

On the Detection of Side-Channel Attacks.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

InfoLeak: Scheduling-Based Information Leakage.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
Proceedings of the International Workshop on MILS: Architecture and Assurance for Secure Systems, 2018

2017
A Security Architecture for Railway Signalling.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Challenges and Approaches in Securing Safety-Relevant Railway Signalling.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2015
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Comparison of Mechanisms.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
Proceedings of the SECRYPT 2014, 2014

Towards a Framework for Benchmarking Privacy-ABC Technologies.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

On the Feasibility of Side-Channel Attacks in a Virtualized Environment.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Security Quantification in Mixed Mode Systems.
Proceedings of the 8th Joint Workshop of the German Research Training Groups in Computer Science, 2014

2013
SecLA-Based Negotiation and Brokering of Cloud Resources.
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013

Negotiating and Brokering Cloud Resources based on Security Level Agreements.
Proceedings of the CLOSER 2013, 2013

2012
Quantitative Assessment of Cloud Security Level Agreements - A Case Study.
Proceedings of the SECRYPT 2012, 2012

Enhancing super-resolution reconstructed image quality in 3D MR images using simulated annealing.
Proceedings of the Medical Imaging 2012: Image Processing, 2012

2010
Using the phone with a single input signal only: evaluation of 3dscan's telephone module.
Proceedings of the 12th International ACM SIGACCESS Conference on Computers and Accessibility, 2010


  Loading...