Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Armando, Alessandro
,
Gabriele Costa
,
Alessio Merlo
,
Luca Verderame
, and
Konrad Wrona
.
Developing a NATO BYOD Security Policy
In
International Conference on Military Communications and Information System, ICMCIS
. Brussels, Belgium, 2016.
Buriro, Attaullah
,
Bruno Crispo
,
Filippo Del Frari
,
Jeffrey Klardie
, and
Konrad Wrona
.
"
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones
." In
Technology and Practice of Passwords, Lecture Notes in Computer Science
, 45-61. Vol. 9551. Cham: Springer, 2015.
Buriro, Attaullah
,
Bruno Crispo
,
Filippo Frari
, and
Konrad Wrona
.
"
Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics
." In
New Trends in Image Analysis and Processing − ICIAP 2015 Workshops
. Cham: Springer, 2015.
Buriro, Attaullah
,
Bruno Crispo
,
Filippo Delfrari
, and
Konrad Wrona
.
Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication
In
Proceedings of the Mobile Security Technologies Workshop (MOST), in conjunction with 37th IEEE Symposium on Security and Privacy
. San Jose, CA, 2016.
Desolneux, Agnes
,
Lionel Moisan
, and
Jean-Michel Morel
.
"
The Helmholtz Principle
." In
From Gestalt Theory to Image Analysis, Interdisciplinary Applied Mathematics
, 31-45. Vol. 34 . Springer, 2008.
Balinsky, Alexander
,
Helen Balinsky
, and
Steven Simske
.
On the Helmholtz Principle for Data Mining
In
Technical report
. HP Laboratories, 2010.
Balinsky, Alexander
,
Helen Balinsky
, and
Steven Simske
.
Rapid Change Detection and Text Mining
In
Proceedings of the 2nd IMA Conference on Mathematics in Defence
. Swindon, UK: Defence Academy of the United Kingdom, 2011.
Wrona, Konrad
,
Sander Oudkerk
,
Alessandro Armando
,
Silvio Ranise
, and
Lisa Ferrari
.
Assisted Content-based Labelling and Classification of Documents
In
Proceedings of the International Conference on Military Communications and Information System (ICMCIS)
., 2016.
NATO, Cyber defence
., 2016.
NATO, Emerging Security Challenges Division
., 2016.
NATO, Cooperative Cyber Defence Centre of Excellence
., 2016.
NATO, Allied Command Transformation
., 2016.
NATO Headquarters
., 2016.
NATO Communications and Information Agency
., 2016.
NATO, COI Cooperation Portal
., 2016.
Sidoran, James
.
Information Assurance/Cyber Defence Research Framework
In
Technical Report
. Paris: NATO Science and Technology Organization, 2014.
NATO Security Investment Programme
., 2016.
NATO Basic Ordering Agreement Orders (BOA)
., 2016.
Le Beau, John J.
.
"
New Blood: The Recruitment of Terrorists
." In
The Dangerous Landscape
, 1-18., 2013.
Gohel, Sajjan
.
"
Disrupting Plots and Countering Ideology: Successes, Obstacles and Future Challenges for Intelligence Sharing in the United Kingdom
." In
The Dangerous Landscape
, 19-36., 2013.
Antoliš, Krunoslav
.
"
Internet Forensics and Combating Terrorism
." In
The Dangerous Landscape
, 37-45., 2013.
Perl, Raphael
, and
Nemanja Malisevic
.
"
A Comprehensive Approach to Cyber Security –Trends, Challenges and the Way Forward
." In
The Dangerous Landscape
, 47-61., 2013.
Bockstette, Carsten
.
"
After Bin Laden: Jihadist Terrorist Use of Strategic Communication to Enlarge the Community of Believers
." In
The Dangerous Landscape
, 63-77., 2013.
Forster, Peter K.
.
"
Terrorist Innovation: Homegrown Terrorism and the Internet
." In
The Dangerous Landscape
, 79-86., 2013.
Feiler, Michael
.
"
Islamic Extremism – Analyzing the Risks
." In
The Dangerous Landscape
, 87-97., 2013.
Pages
« първа
‹ предишна
…
212
213
214
215
216
217
218
219
220
…
следваща ›
последна »
509501 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance