Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Spencer, A.
,
P.E. Tarlow
,
V.G.B. Gowreesunkar
, and
S.W. Maingi
.
"
Tourism Destination Management in a Post-Pandemic Context
." In
Tourism Security-Safety and Post Conflict Destinations
., 2021.
Makki, Muhammad
, and
Waseem Iftikhar
.
"
Transformation in Political Economy of Post-conflict North Waziristan, Pakistan
."
Journal of Asian and African Studies
(2021).
Gdowski, Bartłomiej
,
Rafał Kościej
, and
Marcin Niemiec
.
"
Heuristic-based Intrusion Detection Functionality in a Snort Environment
."
Information & Security: An International Journal
50, no. 1 (2021): 23-36 .
Sharkov, George
,
Christina Todorova
, and
Pavel Varbanov
.
"
Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification
."
Information & Security: An International Journal
50, no. 1 (2021): 11-22.
Tagarev, Todor
,
Nikolai Stoianov
,
George Sharkov
, and
Yantsislav Yanakiev
.
"
AI-driven Cybersecurity Solutions, Cyber Ranges for Education & Training, and ICT Applications for Military Purposes
."
Information & Security: An International Journal
50, no. 1 (2021): 5-8.
Panagiotou, Panos
,
Notis Mengidis
,
Theodora Tsikrika
,
Stefanos Vrochidis
, and
Ioannis Kompatsiaris
.
"
Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods
."
Information & Security: An International Journal
50, no. 1 (2021): 37-48 .
Yucel, Cagatay
,
Adam Lockett
,
Ioannis Chalkias
,
Dimitrios Mallis
, and
Vasilios Katos
.
"
MAIT: Malware Analysis and Intelligence Tool
."
Information & Security: An International Journal
50, no. 1 (2021): 49-65 .
Turčaník, Michal
.
"
Network User Behaviour Analysis by Machine Learning Methods
."
Information & Security: An International Journal
50, no. 1 (2021): 66-78 .
Lande, Dmytro
,
Ihor Subach
,
Olexander Puchkov
, and
Artem Soboliev
.
"
A Clustering Method for Information Summarization and Modelling a Subject Domain
."
Information & Security: An International Journal
50, no. 1 (2021): 79-86 .
Rajamäki, Jyri
, and
Heikki Hämäläinen
.
"
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES
."
Information & Security: An International Journal
50, no. 1 (2021): 103-116 .
Penchev, Georgi
.
"
Planning and Implementing Change in Cyber Security Network Organisations
."
Information & Security: An International Journal
50, no. 1 (2021): 89-101 .
Sharkov, George
,
Christina Todorova
,
Georgi Koykov
, and
Georgi Zahariev
.
"
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising
."
Information & Security: An International Journal
50, no. 2 (2021): 129-148 .
Grigorov, Grigor
.
"
The Role of Information Campaigns and Advertising in the Military Recruitment System
."
Information & Security: An International Journal
50, no. 1 (2021): 117-126 .
Slavchev, Veselin
.
"
Using Cyber Ranges in Cybersecurity Management Educational Programmes
."
Information & Security: An International Journal
50, no. 2 (2021): 161-168 .
Pavlova, Elitsa
.
"
Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities
."
Information & Security: An International Journal
50, no. 2 (2021): 149-159 .
Kolev, Alexander
, and
Lili Pavlova
.
"
Augmented Reality in an Enhanced Command and Control Application
."
Information & Security: An International Journal
50, no. 2 (2021): 180-192.
Blagoev, Ivan
,
Todor Balabanov
, and
Iliyan Iliev
.
"
RSA Weaknesses Caused by the Specifics of Random Number Generation
."
Information & Security: An International Journal
50, no. 2 (2021): 171-179 .
Ranov, Alexander
, and
Alexander Kolev
.
"
A Security Approach to a Military Autonomous Platform Path Planning
."
Information & Security: An International Journal
50, no. 2 (2021): 193-203.
Ivanov, Yordan Shterev
.
"
Concepts in Networks and Communication Security and Graph Theory
."
Information & Security: An International Journal
50, no. 2 (2021): 205-210 .
Ланде, Дмитро
,
Олег Андрійчук
,
Олег Дмитренко
,
Віталій Циганок
, and
Ярослава Порпленко
.
"
Побудова баз знань систем підтримки прийняття рішень з використанням направлених мереж термінів при дослідженні інформаційних операцій
."
Information Technology and Security
8, no. 2 (2020).
Chen, Zhiyuan
,
Waleed Mahmoud Soliman
,
Amril Nazir
, and
Mohammad Shorfuzzaman
.
"
Variational Autoencoders and Wasserstein Generative Adversarial Networks for Improving the Anti-Money Laundering Process
."
IEEE Access
9 (2021): 83762-83785.
Jean-Pierre, Jermaine Jewel
.
User Awareness and Knowledge of Cybersecurity and the Impact of training in the Commonwealth of Dominica
. Vol. Doctoral Dissertation. Walden University , 2021.
Вахью, И.
.
Проблема международных киберугроз для критической информационной инфраструктуры национальных государств и проблема выработки эффективных международных мер противодействия
. Vol. бакалавр. Томск: Томский Государствнный Университет, 2021.
Marcelino, Henriques Manuel
.
Segurança cibernética e ciberdefesa em Moçambique: fundamentos, características e desafios
In
Faculdade de ciências econômicas, Programa de pós-graduação em estudos estratégicos internacionais
. Maputo: Universidade Federal do Rio Grande do Sul , 2021.
Srivatanakul, Thitima
, and
Fenio Annansingh
.
"
Incorporating active learning activities to the design and development of an undergraduate software and web security course
."
Journal of Computers in Education
(2021).
Pages
« първа
‹ предишна
…
493
494
495
496
497
498
499
500
501
…
следваща ›
последна »
505403 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all