Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Krasovska, Hanna
,
Olha Izmailova
, and
Kateryna Krasovska
.
Prototyping of Intellectual Decision Support System for Organizational and Technological Trainings in Construction
In
XII International scientific and practical conference, “Areas of scientific thought”. Mathematics. Physics. Modern Information technologies
. Sheffield, UK: Science and Education , 2016.
Krasovska, Hanna
,
Olha Izmailova
, and
Kateryna Krasovska
.
"
Approach to Construct an Information Basis for Decision-Making System for a Comprehensive Assessment of Innovative Technogenic Safety Projects in Construction
."
Shliakhy pidvyshchennia efektyvnosti budivnytstva v umovakh formuvannia rynkovykh vidnosyn: Zb. naukovykh prats
28 (2012): 222-229.
Volkovich, Viktor
,
Alexey Volochin
,
Vladimir Zaslavskyi
, and
Igor Ushakov
.
Models and Techniques for Reliability Optimization of Complex Systems
. Kyiv: Naukova Dumka, 1993.
Kozhedub, Yurii
.
"
Implementation of a Process Approach to Information Security Risk Management in Documents NIST P-ISSN 2411-1031
."
Information Technology and Security
2, no. 9 (2017): 76-89.
Barybin, Oleksii
.
"
Methodology of Testing for the Penetration of the Website of a Higher Education Institute
."
Standartyzatsiia, sertyfikatsiia, yakist. Systemy upravlinnia
4, no. 116 (2019): 12-18.
Korchenko, Oleksandr
,
Svitlana Kazmirchuk
, and
Berik Akhmetov
.
Applied Information Security Assessment Systems
. TsP Komprynt, 2017.
Klymov, Sergey
.
"
Methodology for Assessing Possible Damage from the Security Violation of the Information of the Automated System
."
Yzvestyia TRTU
4, no. 33 (2003): 27-31.
Modern Methods and Means of Analysing and Controlling the Risks of the CRAMM Company’s System Security, RiskWatch in HRYF
., 2004.
Bulbula, Dilek
,
Hendrik Hakenes
, and
Claudia Lambert
.
"
What Influences Banks’ Choice of Credit Risk Management Practices
."
Theory and Evidence
40 (2019): 1-14.
Dudykevych, Valeriy
,
Ivan Prokopyshyn
,
Vasyl Chekurin
,
Ivan Opirskyy
,
Yuriy Lakh
,
Taras Kret
,
Yevheniia Ivanchenko
, and
Ihor Ivanchenko
.
"
A Multicriterial Analysis of the Efficiency of Conservative Information Security Systems
."
Eastern-European Journal of Enterprise Technologies
3, no. 9(99) (2019): 6-13.
Saaty, Thomas L.
, and
Luis G. Vargas
.
Decision Making with the Analytic Network Process: Economic, Political, Social and Technological Applications with Benefits, Opportunities, Costs and Risks
. Springer, 2013.
Zaslavskyi, Volodymyr
,
Kateryna Krasovska
, and
Maya Pasichna
.
"
Application of the Method of Analysis of Hierarchies in Solving the Problem of Diversification of the Composition of the Portfolio of Electricity Generation
."
Visnyk Kyivskoho universytetu, Seriia: Fizyko-matematychni nauky
2 (2017): 123-131.
Izmailova, Olha
,
Sofiia Pyda
,
Iryna Melnyk
, and
Kateryna Krasovska
.
"
Improving the Reliability of the Values of the Significance of Criteria in Determining the Market Value of Real Estate Objects
."
Upravlinnia rozvytkom skladnykh system
29 (2017): 109-118.
Dragaš, Orhan
, and
Zoran Dragišić
.
"
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19
."
Information & Security: An International Journal
48, no. 2 (2021): 213-225.
Menga, XianJia
,
Shi Qiub
,
Shaohua Wanc
,
Keyang Chengd
, and
Lei Cuia
.
"
A motor imagery EEG signal classification algorithm based on recurrence plot convolution neural network
."
Pattern Recognition Letters
146 (2021): 134-141.
Reilly, Ronan Eric
.
“The truth is in doubt here!”: Critically Assessing Sources and Information in a Conspiratorial World
In
Institute of Media and Communication
. Vol. Master’s Thesis in Journalism. Universitetet i Oslo, 2020.
Khoroshko, Volodymyr
,
Zhukov Anatoly
, and
Latko Iryna
.
"
Research of Processes Occurring with Information Counter-Fighting in Modern Conditions
."
Scientific and practical cyber security journal
(2021).
Поночовний, Юрій Леоні
.
Методологічні основи та інформаційні технології забезпечення гарантоздатності інформаційно-керуючих систем з багатоцільовим обслуговуванням
. Vol. Автореферат дисертації на здобуття наукового ступеня доктора технічних наук. Харків: Національний Технічний Університет, «Харківський Політехнічний Інститут», 2021.
Petrivskyi, Volodymyr
,
Viktor Shevchenko
,
Oleksiy Bychkov
,
Maksym Brazhenenko
, and
Pavel Petrov
.
CAD technology for optimal territory covering
In
2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)
. Lviv, Ukraine: IEEE, 2021.
Pfeifer, Tomáš
.
Kurdská menšina a Strana spravedlnosti a rozvoje Turecka: Příčiny sekuritizace “kurdské otázky”
. Vol. Diplomová práce. Praha: Vysoká škola CEVRO Institut, 2020.
Ivanchenko, Oleg
,
Eugene Brezhniev
,
Ihor Kliushnikov
, and
Boris Moroz
.
"
Cloud Simulation and Virtualization for Testing of Critical Energy Infrastructure Components
."
International Journal of Computing
20, no. 1 (2021): 119-128.
Tso, Chen-Dong
.
"
Five. Digital Media and the Transformation of Politics in Taiwan
." In
New Challenges for Maturing Democracies in Korea and Taiwan
. Stanford University Press , 2014.
Thom, Jay
,
Yash Shah
, and
Shamik Sengupta
.
Correlation of Cyber Threat Intelligence Data Across Global Honeypots
In
2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)
. NV, USA: IEEE Institute of Electrical and Electronics Engineers, 2021.
Fachrie, Muhammad
.
Kementerian Pendidikan dan Kebudayaan Universitas Riau Fakultas Ilmu Sosial dan Ilmu Politik Pekanbaru
In
Jurusan Ilmu Hubungan Internasional Fakultas Ilmu Sosial Dan Ilmu Politik
. Universitas Riau Pekanbaru , 2013.
Shen, Yeming
,
Thomas C. Sharkey
,
Boleslaw K. Szymanski
, and
William Wallacea
.
"
Interdicting Interdependent Contraband Smuggling, Money and Money Laundering Networks
."
Socio-Economic Planning Sciences
(2021).
Pages
« първа
‹ предишна
…
481
482
483
484
485
486
487
488
489
…
следваща ›
последна »
505710 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all