Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Yastrebenetsky, Michael
, and
Vyacheslav Kharchenko
.
Nuclear Power Plant Instrumentation and Control Systems for Safety and Security
. Hershey, PA: IGI Global, 2014.
Huffmire, Ted
,
Cynthia Irvine
,
Thuy D. Nguyen
,
Timothy Levin
,
Ryan Kastner
, and
Timothy Sherwood
.
Handbook of FPGA Design Security
. Dordrecht: Springer, 2010.
Badrignans, Benoit
,
Jean-Luc Danger
,
Viktor Fischer
,
Guy Gogniat
, and
Lionel Torres
.
Security Trends for FPGAs: From Secured to Secure Reconfigurable Systems
. Springer, 2011.
Tehranipoor, Mohammad
, and
Cliff Wang
.
Introduction to Hardware Security and Trust
. New York, NY: Springer, 2012.
TEMPUS GreenCo project web-site
., 2015.
Kharchenko, Vyacheslav
,
Oleg Illiashenko
,
Chris Phillips
, and
Jüri Vain
.
Green Computing within the Context of Educational and Research Projects
In
Recent Advances in Computer Science, Proceedings of the 19th International Conference on Computers (part of CSCC'15)
. Zakynthos Island, Greece, 2015.
TEMPUS CABRIOLET project web-site
., 2015.
Kharchenko, Vyacheslav
, and
Yuriy P. Kondratenko
.
"
Analysis of Peculiarities of Innovative Collaboration between Academic Institutions and IT Companies in Areas S2B and B2S
."
Technical News − in Ukrainian
39-40 (2014): 15-19.
Kondratenko, Yuriy P.
.
"
Revolution in Computer Science and Engineering and Its Impact on Evolution of Higher Education
." In
Revolución, Evolución e Involución en el Futuro de los Sistemas Sociales
, 129-159. Barcelona: Real Academia de Ciencias Económicas y Financieras, 2014.
Kharchenko, Vyacheslav
,
Oleg Illiashenko
,
Artem Boyarchuk
,
Chris Phillips
,
Jüri Vain
, and
Madli Krispin
.
"
FPGA-based Critical Computing: TEMPUS and FP7 Projects Issues
." In
Proceedings of the 10th European Workshop on Microelectronics Education
, 74-79., 2014.
Skarga-Bandurova, Inna
,
Alexandr Ryazantsev
, and
Katerina Kiryushatova
.
"
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
."
Information & Security: An International Journal
35, no. 2 (2016): 123-132.
Androulidakis, Iosif
,
Vyacheslav Kharchenko
, and
Andriy Kovalenko
.
"
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
."
Information & Security: An International Journal
35, no. 1 (2016): 99-120.
Management of Information Security and Risk. Programme Specification
. City University London, 2015.
Cyber Security. Content and Structure
. City University London, 2015.
Macaulay, Tyson
.
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
. Boston, MA: Auerbach Publications, 2011.
Landoll, Douglas
.
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments
. 2nd ed. Boca Raton, FL: CRC Press, Taylor & Francis Group LLC, 2011.
Peltier, Thomas R.
.
Information Security Risk Analysis
. 3rd ed. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2010.
The IAONA Handbook for Network Security. Industrial Automation Open Networking Alliance
In
Version 1.5
. Magdeburg, Germany, 2006.
9. Noyes, Daniel
.
"
Cyber Security Testing and Training Programs for Industrial Control Systems
." In
The 18th Pacific Basin Nuclear Conference (PBNC 2012), BEXCO
. Busan, Korea, 2012.
MulVAL: A Logic-based, Data-driven Enterprise Security Analyzer
. Argus Cybersecurity Lab at Kansas State University, 2015.
Bayesian network and simulation software for risk analysis and decision support AgenaRisk
., 2015.
About Enterprise Architecture Analysis Tool
. KTH Royal Institute of Technology, 2015.
The Cyber Security Modeling Language
. KTH Royal Institute of Technology, 2015.
Brustoloni, Jose Carlos
.
"
Laboratory Experiments for Network Security Instruction
."
Journal on Educational Resources in Computing
6, no. 4 (2006).
The ENCS Red Team Blue Team Training for Industrial Control Systems and Smart Grid Cyber Security
. 16. European Network for Cyber Security, 2015.
Pages
« първа
‹ предишна
…
207
208
209
210
211
212
213
214
215
…
следваща ›
последна »
461243 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance