dblp: Tsvetoslava Vateva-Gurova
https://dblp.org/pid/58/8733.html
dblp person page RSS feedThu, 28 Nov 2024 20:32:19 +0100en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Tsvetoslava Vateva-Gurovahttps://dblp.org/pid/58/8733.html14451Analysis and Detection of Cache-Based Exploits.http://tuprints.ulb.tu-darmstadt.de/9770/Tsvetoslava Vateva-Gurova: Analysis and Detection of Cache-Based Exploits. Darmstadt University of Technology, Germany, 2020]]>https://dblp.org/rec/phd/dnb/Vateva-Gurova20Wed, 01 Jan 2020 00:00:00 +0100A Security Architecture for Railway Signalling.https://arxiv.org/abs/2009.04207Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri: A Security Architecture for Railway Signalling.CoRRabs/2009.04207 (2020)]]>https://dblp.org/rec/journals/corr/abs-2009-04207Wed, 01 Jan 2020 00:00:00 +0100Security Requirements Engineering in Safety-Critical Railway Signalling Networks.https://doi.org/10.1155/2019/8348925Markus Heinrich, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, Christoph Krauß, Maria Zhdanova, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber: Security Requirements Engineering in Safety-Critical Railway Signalling Networks.Secur. Commun. Networks2019: 8348925:1-8348925:14 (2019)]]>https://dblp.org/rec/journals/scn/HeinrichVAKSBFK19Tue, 01 Jan 2019 00:00:00 +0100Securing the cloud-assisted smart grid.https://doi.org/10.1016/j.ijcip.2018.08.004Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, Neeraj Suri: Securing the cloud-assisted smart grid.Int. J. Crit. Infrastructure Prot.23: 100-111 (2018)]]>https://dblp.org/rec/journals/ijcip/DemirIVS18Mon, 01 Jan 2018 00:00:00 +0100A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.https://doi.org/10.5281/zenodo.1314095Henk Birkholz, Christoph Krauß, Maria Zhdanova, Don Kuzhiyelil, Tolga Arul, Markus Heinrich, Stefan Katzenbeisser, Neeraj Suri, Tsvetoslava Vateva-Gurova, Christian Schlehuber: A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.MILS@DSN2018]]>https://dblp.org/rec/conf/hipeac/BirkholzKZKAHKS18Mon, 01 Jan 2018 00:00:00 +0100InfoLeak: Scheduling-Based Information Leakage.https://doi.org/10.1109/PRDC.2018.00015Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri: InfoLeak: Scheduling-Based Information Leakage.PRDC2018: 44-53]]>https://dblp.org/rec/conf/prdc/Vateva-GurovaMH18Mon, 01 Jan 2018 00:00:00 +0100On the Detection of Side-Channel Attacks.https://doi.org/10.1109/PRDC.2018.00031Tsvetoslava Vateva-Gurova, Neeraj Suri: On the Detection of Side-Channel Attacks.PRDC2018: 185-186]]>https://dblp.org/rec/conf/prdc/Vateva-GurovaS18Mon, 01 Jan 2018 00:00:00 +0100Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level.https://doi.org/10.1007/978-3-030-12085-6_3Tsvetoslava Vateva-Gurova, Salman Manzoor, Rubén Trapero, Neeraj Suri: Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level.IOSec@RAID2018: 27-38]]>https://dblp.org/rec/conf/raid/Vateva-GurovaMT18Mon, 01 Jan 2018 00:00:00 +0100Threat Modeling the Cloud: An Ontology Based Approach.https://doi.org/10.1007/978-3-030-12085-6_6Salman Manzoor, Tsvetoslava Vateva-Gurova, Rubén Trapero, Neeraj Suri: Threat Modeling the Cloud: An Ontology Based Approach.IOSec@RAID2018: 61-72]]>https://dblp.org/rec/conf/raid/ManzoorVTS18Mon, 01 Jan 2018 00:00:00 +0100Challenges and Approaches in Securing Safety-Relevant Railway Signalling.https://doi.org/10.1109/EuroSPW.2017.63Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri: Challenges and Approaches in Securing Safety-Relevant Railway Signalling.EuroS&P Workshops2017: 139-145]]>https://dblp.org/rec/conf/eurosp/SchlehuberHV0S17Sun, 01 Jan 2017 00:00:00 +0100A Security Architecture for Railway Signalling.https://doi.org/10.1007/978-3-319-66266-4_21Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri: A Security Architecture for Railway Signalling.SAFECOMP2017: 320-328]]>https://dblp.org/rec/conf/safecomp/SchlehuberHVKS17Sun, 01 Jan 2017 00:00:00 +0100The Impact of Hypervisor Scheduling on Compromising Virtualized Environments.https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.283Tsvetoslava Vateva-Gurova, Neeraj Suri, Avi Mendelson: The Impact of Hypervisor Scheduling on Compromising Virtualized Environments.CIT/IUCC/DASC/PICom2015: 1910-1917]]>https://dblp.org/rec/conf/IEEEcit/Vateva-GurovaSM15Thu, 01 Jan 2015 00:00:00 +0100Comparison of Mechanisms.https://doi.org/10.1007/978-3-319-14439-9_4Michael Østergaard Pedersen, Gert Læssøe Mikkelsen, Fatbardh Veseli, Ahmad Sabouri, Tsvetoslava Vateva-Gurova: Comparison of Mechanisms.Attribute-based Credentials for Trust2015: 109-141]]>https://dblp.org/rec/books/daglib/p/PedersenMVSV15Thu, 01 Jan 2015 00:00:00 +0100Security Quantification in Mixed Mode Systems.https://dblp.org/pid/58/8733.htmlTsvetoslava Vateva-Gurova: Security Quantification in Mixed Mode Systems.Joint Workshop of the German Research Training Groups in Computer Science2014: 81]]>https://dblp.org/rec/conf/dfg/Vateva-Gurova14Wed, 01 Jan 2014 00:00:00 +0100On the Feasibility of Side-Channel Attacks in a Virtualized Environment.https://doi.org/10.1007/978-3-319-25915-4_17Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri: On the Feasibility of Side-Channel Attacks in a Virtualized Environment.ICETE (Selected Papers)2014: 319-339]]>https://dblp.org/rec/conf/icete/Vateva-GurovaLP14Wed, 01 Jan 2014 00:00:00 +0100Towards a Framework for Benchmarking Privacy-ABC Technologies.https://doi.org/10.1007/978-3-642-55415-5_16Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri: Towards a Framework for Benchmarking Privacy-ABC Technologies.SEC2014: 197-204]]>https://dblp.org/rec/conf/sec/VeseliVKRS14Wed, 01 Jan 2014 00:00:00 +0100Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.https://doi.org/10.5220/0005052101130124Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri: Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.SECRYPT2014: 113-124]]>https://dblp.org/rec/conf/secrypt/Vateva-GurovaLPS14Wed, 01 Jan 2014 00:00:00 +0100SecLA-Based Negotiation and Brokering of Cloud Resources.https://doi.org/10.1007/978-3-319-11561-0_1Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Alessandra De Benedictis: SecLA-Based Negotiation and Brokering of Cloud Resources.CLOSER (Selected Papers)2013: 1-18]]>https://dblp.org/rec/conf/closer/LunaVSRB13Tue, 01 Jan 2013 00:00:00 +0100Negotiating and Brokering Cloud Resources based on Security Level Agreements.https://dblp.org/pid/58/8733.htmlJesus Luna Garcia, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Loredana Liccardo: Negotiating and Brokering Cloud Resources based on Security Level Agreements.CLOSER2013: 533-541]]>https://dblp.org/rec/conf/closer/GarciaVSRL13Tue, 01 Jan 2013 00:00:00 +0100Enhancing super-resolution reconstructed image quality in 3D MR images using simulated annealing.https://doi.org/10.1117/12.911761Sami ur Rahman, Tsvetoslava Vateva, Stefan Wesarg: Enhancing super-resolution reconstructed image quality in 3D MR images using simulated annealing.Image Processing2012: 831441]]>https://dblp.org/rec/conf/miip/RahmanVW12Sun, 01 Jan 2012 00:00:00 +0100Quantitative Assessment of Cloud Security Level Agreements - A Case Study.https://dblp.org/pid/58/8733.htmlJesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri: Quantitative Assessment of Cloud Security Level Agreements - A Case Study.SECRYPT2012: 64-73]]>https://dblp.org/rec/conf/secrypt/GarciaGVS12Sun, 01 Jan 2012 00:00:00 +0100Using the phone with a single input signal only: evaluation of 3dscan's telephone module.https://doi.org/10.1145/1878803.1878877Torsten Felzer, Stephan Rinderknecht, Tsvetoslava Vateva: Using the phone with a single input signal only: evaluation of 3dscan's telephone module.ASSETS2010: 293-294]]>https://dblp.org/rec/conf/assets/FelzerRV10Fri, 01 Jan 2010 00:00:00 +0100