Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Growth of IT-specialists Quantity on the Separate Types of the Certification Programs
. Monster Blog, 2016.
"
Review of European Standards on ICT competences
."
Information Management (in Russian)
7 (2013): 30-35.
Networking Academy Course List
. Cisco Networking Academy, 2016.
Certifications
In
The Cisco Learning Network
., 2016.
Geographic Distribution of Cisco Networking Academies
., 2016.
Sequence of Cisco Courses Study
In
Cisco Networking Academy
., 2016.
CCNA Security
In
Cisco Networking Academy
., 2016.
Cisco Networking Academy Membership Guide v3.0
In
Cisco Networking Academy
., 2014.
Beaudoin, Luc
,
Michael Froh
,
Marc Gregoire
, and
Julie Lefebvre
.
"
Computer Network Defence Situational Awareness: Information Requirements
." In
Military Communications Conference
., 2006.
Lagadec, Philippe
,
L. Dandurand
,
E. Bouillon
,
Konrad Wrona
, and
S. Torrente
.
"
Cyber Defence Situational Awareness and Dynamic Risk Assessment
." In
Presentation at the NATO Research and Technology Organisation Symposium on Information Assurance and Cyber Defence, IST-091
. Tallin, Estonia, 2010.
Wrona, Konrad
,
Tamsin Moye
,
Philippe Lagadec
,
Michael Street
,
Peter Lenk
, and
Frederic Jordan
.
"
Cybersecurity Innovation in NATO: Lessons Learned and Recommendations
."
Information & Security: An International Journal
36 (2017).
Brezhniev, Eugene
, and
Vyacheslav Kharchenko
.
"
Smart Grid Safety and Security: Educational and Research Activities
."
Information & Security: An International Journal
35, no. 2 (2016): 165-178.
Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses
. Idaho Falls, ID: Idaho National Laboratory, 2010.
Common Cybersecurity Vulnerabilities in Industrial Control Systems
In
Homeland Security, Control Systems Security Program
. Washington, D.C.: National Cyber Security Division, 2011.
Wandera, Max
,
Brent Jonasson
, and
Jacques Benoit
.
Cybersecurity Considerations for Electrical Distribution Systems
In
White Paper
., 2014.
Stamp, Jason
,
John Dillinger
,
William Young
, and
Jennifer DePoy
.
Common Vulnerabilities in Critical Infrastructure Control Systems
. Albuquerque, NM: Sandia National Laboratories, 2003.
Zadeh, Lotfi A.
, and
Janusz Kacprzyk
.
Computing with Words in Information/Intelligent Systems – Part 1: Foundations
. Berlin Heidelber: Springer, 1999.
Giacobe, Nicklaus A.
.
Application of the JDL Data Fusion Process Model for Cyber Security
In
Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications
. Vol. 7710. SPIE, 2010.
Zhang, Yan
,
Shuguang Huang
,
Shize Guo
, and
Junmao Zhu
.
"
Multi-sensor Data Fusion for Cyber Security Situation Awareness
."
Procedia Environmental Sciences
10, no. Part B (2011): 1029-1034.
Simmhan, Yogesh L.
,
Beth Plale
, and
Dennis Gannon
.
"
A Survey of Data Provenance in e-Science
."
ACM SIGMOD
34, no. 3 (2005): 31-36.
Stonebraker, Michael
.
"
SQL Databases v. NoSQL Databases
."
Communications of the ACM
53, no. 4 (2010): 10-11.
Elastic
., 2016.
Lagadec, Philippe
.
"
Visualisation et Analyse de Risque Dynamique pour la Cyber- Défense
." In
Symposium sur la Sécurité des Technologies de l’Information et de la Communication (SSTIC)
. Rennes, 2010.
Armando, Alessandro
,
Gabriele Costa
, and
Alessio Merlo
.
Bring Your Own Device, Securely
In
28th Annual ACM Symposium on Applied Computing, SAC’13
. Coimbra, Portugal, 2013.
Armando, Alessandro
,
Gabriele Costa
,
Alessio Merlo
, and
Luca Verderame
.
Enabling BYOD Through Secure Meta-market
In
2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec’14
. Oxford, United Kingdom, 2014.
Pages
« първа
‹ предишна
…
211
212
213
214
215
216
217
218
219
…
следваща ›
последна »
510855 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance