Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Semchynskyi, Kostiantyn
.
"
Особливості гібридних конфліктів у контексті російської агресії проти України
."
Домашня сторінка
5 (2020).
Kovacheva, Ralitsa
.
"
The Hybrid War: Political Use and Media Representation
."
Годишник на Софийския университет „Св. Климент Охридски”, Факултет по журналистика и масова комуникация
26, no. 1 (2019).
Razakamaharavo, Velomahanina
.
Putting Humans at the Centre of the Governance of the Integration and Deployment of Artificial Intelligence in Peace Support Operations
., 2020.
Borissova, Daniela
,
Zornitsa Dimitrova
,
Magdalena Garvanova
,
Ivan Garvanov
,
Petya Cvetkova
,
Vasil Dimitrov
, and
Andrea Pandulis
.
"
Two-stage Decision-Making Approach to Survey the Excessive Usage of Smart Technologies
."
Problems of Engineering Cybernetics and Robotics, Bulgarian Academy of Sciences
73 (2020): 3-16.
Borissova, Daniela
,
N. Keremedchieva
, and
D. Keremedchiev
.
Business Intelligence Approach to Support Decision Making in Publishing Sector
In
43rd International Convention on Information, Communication and Electronic Technology (MIPRO)
. Opatija, Croatia, 2020.
Kovács, Attila Máté
.
"
Stranger Things – Threats And Opportunities Related To The Internet Of Things
."
Information and Communication Security
1 (2020).
Borissova, Daniela
,
Petya Cvetkova
,
Ivan Garvanov
, and
Magdalena Garvanova
.
"
A Framework of Business Intelligence System for Decision Making in Efficiency Management
." In
International Conference on Computer Information Systems and Industrial Management CISIM 2020
., 2020.
Minchev, Zlatogor
.
"
Future Digital Society Transformational Transcendents & Gaps Extended Outlook
."
Romanian Cyber Security Journal
1, no. 2 (2020).
G. Ramirez-Hernandez, Renée
.
Community College Software Deployment Success Rate: A Delphi Qualitative Case Study
In
Information Systems and Technology
. Vol. Doctor of Management. University of Phoenix , 2020.
Efe, Ahmet
.
"
It Based Innovation at the Management Mindset of Organisations
."
Dijital Çağda İşletmecilik Dergisi
3, no. 2 (2020).
Penchev, Georgi
, and
Velizar Shalamanov
.
"
Design of A Bulgarian National Academic Cyber Network In The NATO
." In
Information Security in Education and Practice
. Cambridge Scholars Publishing, 2021.
Sharkov, George
,
Yavor Papazov
,
Christina Todorovaa
,
Georgi Koykov
, and
Georgi Zahariev
.
"
Cybersecurity Tools for Threat Intelligence and Vulnerability Monitoring for National and Sectoral Analysis
." In
Information Security in Education and Practice
. Cambridge Scholars Publishing, 2020.
Kaloyanova, Kalinka
.
"
Towards Requirements for Cybersecurity Curricula
." In
Information Security in Education and Practice
. Cambridge Scholars Publishing, 2020.
Leontiiev, Kostiantyn
,
Ievgen Babeshko
, and
Vyacheslav Kharchenko
.
Assumption Modes and Effect Analysis of XMECA: Expert based safety assessment
In
2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)
. Kyiv, Ukraine, 2020.
Okazaki, Hiroyuki
,
Shogo Shimura
,
Ki Miyamoto
,
Ki Watanabe
,
Yuichi Fuda
, and
Yasuyuki Murakami
.
"
Practice of cryptographic education using formal security verification tools and the issues of e-Learning teaching materials
."
J-STAGE
37, no. 1 (2020).
Vyas, Deepak G.
,
Niyati Trivedi
,
Vivek Pandya
,
Praghnesh Bhatt
, and
Ajit Pujara
.
Future Challenges and Issues in Evolution of the Smart Grid and Recommended Possible Solutions
In
2019 IEEE 16th India Council International Conference (INDICON)
. Rajkot, India, 2019.
Russo, Enrico
,
Gabriele Costa
, and
Alessandro Armando
.
Scenario Design and Validation for Next Generation Cyber Ranges
In
2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)
. Cambridge, MA, USA, 2018.
Alloghani, Mohamed
,
Dhiya Al-Jumeily
,
Abir Hussain
,
Jamila Mustafina
,
Thar Baker
, and
Ahmed J. Aljaaf
.
"
Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities to Cyber Attacks
." In
Nature-Inspired Computation in Data Mining and Machine Learning. Studies in Computational Intelligence
., 2020.
Fernández-Caramés, Tiago M.
, and
Paula Fraga-Lamas
.
"
Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases
."
Sensors
20, no. 11 (2020): 3048.
Rahouti, Mohamed
.
"
Board 128: Understanding Global Environment for Network Innovations (GENI) and Software-defined Networking (SDN) for Computer Networking and Security Education
." In
2019 ASEE Annual Conference & Exposition
. Tampa, Florida, 2019.
van der Velde, Dennis
,
Martin Henze
,
Philipp Kathmann
,
Erik Wassermann
,
Michael Andres
,
Detert Bracht
,
Raphael Ernst
,
George Hallak
,
Benedikt Klaer
,
Philipp Linnartz
et al.
"
Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
."
arXiv:2003.06185 [
(2020).
Rahouti, Mohamed
, and
Kaiqi Xiong
.
A Customized Educational Booster for Online Students in Cybersecurity Education. M Rahouti, K Xiong - CSEDU (2), 2019
In
Proceedings of the 11th International Conference on Computer Supported Education (CSEDU 2019)
., 2019.
Hurst, W.
,
N. Shone
,
Q. Shi
, and
B. Bazli
.
"
MICRO-CI: A Testbed for Cyber-Security Research
." In
EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence
., 2016.
Hurst, W.
,
N. Shone
,
Q. Shi
, and
B. Bazli
.
"
Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research
."
International Journal On Advances in Security
10, no. 1&2 (2017): 114-125.
Suryotrisongko, Hatma
, and
Yasuo Musashi
.
"
Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective
." In
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)
. Kaohsiung, Taiwan, 2019.
Pages
« първа
‹ предишна
…
471
472
473
474
475
476
477
478
479
…
следваща ›
последна »
506145 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all