Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Johnson, Chris W.
.
"
Preparing for Cyber-attacks on Air Traffic Management Infrastructures: Cyber-safety Scenario Generation
." In
7th IET International Conference on Sys¬tem Safety, incorporating the Cyber Security Conference
. Edinburgh, UK, 2012.
Newman, Lily Hay
.
Russia’s FireEye Hack Is a Statement—but Not a Catastrophe
. Wired, 2020.
Kovacs, Eduard
.
SolarWinds Says 18,000 Customers May Have Used Compromised Orion Product
. SecurityWeek, 2020.
Tidy, Gordon Coreraand
.
US Treasury and Commerce Department Targeted in Cyber-attack
. BBC News, 2020.
Sattler, Jason
.
"
Significant Attacks on Microsoft Exchange ProxyLogon Detected
."
F-Secure
(2021).
Fruhlinger, Josh
.
Equifax Data Breach FAQ: What Happened, Who Was Affected, What Was the Impact?
. CSO, 2020.
Sonatype
.
2020 DevSecOps Community Survey
., 2021.
Sonatype
.
2020 State of the Software Supply Chain Report
., 2020.
UK Cabinet Office & Detica
.
The Cost of Cyber Crime
., 2011.
Ponemon Institute & Accenture Security
.
The Cost of Cybercrime, 2019
., 2019.
Department for Digital, Culture, Media & Sport
.
Cyber Security Breaches Survey 2020
., 2020.
Sobb, Theresa
,
Benjamin Turnbull
, and
Nour Moustafa
.
"
upply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions
."
Electronics
9, no. 11 (2020): 1864.
Eggers, Shannon
.
"
A Novel Approach for Analyzing the Nuclear Supply Chain Cyber-Attack Surface
."
Nuclear Engineering and Technology
53, no. 3 (2021): 879-887.
Yeboah-Ofori, Abel
, and
Shareeful Islam
.
"
Cyber Security Threat Modeling for Supply Chain Organizational Environments
."
Future Internet
11, no. 3 (2019): 63.
Polatidis, Nikolaos
,
Michalis Pavlidis
, and
Haralambos Mouratidis
.
"
Cyber-attack Path Discovery in a Dynamic Supply Chain Maritime Risk Management System
."
Computer Standards & Interfaces
56 (2018): 74-82.
Security Program Requirements for IACS Service Providers
., 2021.
ENISA
.
Guidelines for Securing the Internet of Things
., 2020.
Whyte, William Foote
.
Learning from the Field: A Guide from Experience
. Beverly Hills, CA: Sage Publications, 1984.
Ristaino, Andre
.
Cybersecurity Critical for System Reliability
. InTech – International Society of Automation, 2016.
Institution of Engineering and Technology
.
Code of Practice: Cyber Security and Safety
., 2021.
Boyes, Hugh
, and
Roy Isbell
.
Code of Practice Cybersecurity for Ships
. London: Institution of Engineering and Technology, 2017.
Ofgem Competent Authority Guidance
., 2018.
Wu, Ing-Long
,
Cheng-Hung Chuang
, and
Chien-Hua Hsu
.
"
Information Sharing and Collaborative Behaviours in Enabling Supply Chain Performance: A Social Exchange Perspective
."
International Journal of Production Economics
148 (2014): 122-132.
Ellram, Lisa M.
.
"
International Purchasing Alliances: An Empirical Study
."
The Interna¬tional Journal of Logistics Management
3, no. 1 (1992): 23-36.
Shin, Nina
, and
Sangwook Park
.
"
Supply Chain Leadership Driven Strategic Resilience Capabilities Management: A Leader-Member Exchange Perspective
."
Journal of Business Research
122 (2021): 1-13.
Pages
« първа
‹ предишна
…
486
487
488
489
490
491
492
493
494
…
следваща ›
последна »
505417 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all