Georgi Tsochev

Georgi Tsochev
Technical University of Sofia | TU · Department of Information Technologies in Industry

PhD

About

42
Publications
4,489
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
157
Citations
Citations since 2017
40 Research Items
157 Citations
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060

Publications

Publications (42)
Conference Paper
In the world of Internet many people become victim of cyberattacks. One of the most devastating threats are DoS and DDoS attacks. In this paper is suggested an Intrusion Detection System in which are implemented machine learning models. SVM classification algorithm is used for making three different machine learning models. Each machine model has s...
Article
Full-text available
Computer networks are based on technology that provides the technical infrastructure where routing protocols are used to transmit packets over the Internet. Routing protocols define how routers communicate with each other by distributing information. They are used to describe how routers communicate with each other, learn available routes, build ro...
Article
Full-text available
Cloud computing is a new technology that is undergoing tremendous development today. People who use it are not able to separate the reasonable from the unreasonable arguments that come with the security requirements in the cloud. The claim that cloud computing is hereditarily insecure is as absurd as the claim that cloud computing does not create n...
Article
The COVID-19 pandemic introduced many limitations and changes in our lives and in particular in education. This article presents problems in distance learning in the field of computer networks and information security between March and June 2020 in the training of engineers with computer science profile.
Conference Paper
Artificial Intelligence (AI) is a very promising field of development, in many directions. It is widespread in computer technology (biotechnology, nanotechnology, Internet of Things, etc.) as well as in robotics, 3D printing, quantum computing, and many more. Using it to predict and defend from cyber attacks is another of its many applications. In...
Article
Full-text available
This article presents a brief overview of the effect of new technologies, how they are changing the manufacturing process, and how the machines are starting to get a lot smarter thanks to the artificial intelligence. The focus is over the examination of Industry 4.0 and how it revolutionized the whole manufacturing segment and what promise of a bet...
Article
Monte Carlo methods are a way to solve the reinforcement learning problem based on average test results. To ensure that well-defined results are available, Monte Carlo methods are used only for episodic tasks. The Monte Carlo term is often used more widely in any valuation method whose operation involves significant participation on a random basis....
Article
Full-text available
An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered. An architecture of Supervisory Control and Data Acquisition system (SCADA) was considered in previous authors...
Article
Digitization of information in all spheres of human activity and use of technological innovations, as a basic case for the emergence of all wages and attacks that are insufficient to modern technologies and the continuous expansion of the complexity of security and hardware. The protection against these attacks and wages can be viewed in different...
Article
Full-text available
In the current age, cyber security is an essential element of any information system. A key aspect is in the critical information infrastructure, where information security has become a top priority for information and network security experts. The interoperability of an ICT infrastructure with other components of it is an important aspect of its l...
Article
Full-text available
The Faculty of Computer Systems and Technology at Technical University – Sofia undertook analyses and experiments on the use of Artificial Intelligence methods in the field of Information Security. In the course of the study a Cyber Defence related to the classification consisting of three phases has been proposed: Operative Cyber Intelligence, Tac...
Conference Paper
Full-text available
Accounting and financial classification and prediction problems are high challenge and researchers use different methods to solve them. Methods and instruments for short time prediction of financial operations using artificial neural network are considered. The methods, used for prediction of financial data as well as the developed forecasting syst...
Conference Paper
Networking solutions (networks of excellence, communities of practice, knowledge portals, etc.) are recognized as effective tools for nuclear training and education services, transfer of good practices, knowledge and programmes, and knowledge management. In addition, the e-learning is recommended as a state of the art and cost effective approach fo...

Network

Cited By

Projects

Projects (2)
Archived project
Public Safety and Security. Alarm systems. Detectors. Terrorism.