Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
McEwen, Adrian
, and
Hakim Cassimally
.
Designing the Internet of Things
. Chichester, West Sussex: United Kingdom: John Wiley and Sons, 2014.
Légaré, Christian
.
Designing the Internet of Things: Part 1 — IoT Devices and Local Networks
. EDN Network, 2014.
Pfister, Cuno
.
Getting started with the Internet of Things
. Sebastopol, CA: O’Reilly Media, 2011.
da Costa, Francis
, and
Byron Henderson
.
Rethinking the Internet of Things - A Scalable Approach to Connecting Everything
. New York: Apress, 2014.
Gonzalez, Marcelo Hector
, and
Jana Djurica
.
"
Internet of Things Offers Great Opportunities and Much Risk
."
ISACA Journal
2 (2015).
Monte, Matthew
.
Network Attacks and Exploitation: A Framework
. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2015.
Dhanjani, Nitesh
.
Abusing the Internet of Things - Blackouts, Freakouts and Stakeouts
. Sebastopol, CA: O’Reilly, 2015.
Hersent, Olivier
,
David Boswarthick
, and
Omar Elloumi
.
The Internet of Things - Key Applications and Protocols
. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2012.
Jing, Qi
,
Athanasios V. Vasilakos
,
Jiafu Wan
,
Jingwei Lu
, and
Dechao Qiu
.
"
Security of the Internet of Things: perspectives and challenges
."
Wireless Networks
20, no. 8 (2014): 2481-2501.
Martin, Robert
.
"
The Internet of Things (IoT) –Removing the Human Element
."
Infosec Writers
(2015).
Bachmann, Sascha-Dominik
, and
Hakan Gunneriusson
.
"
Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Peace and Security
."
The Journal of Terorism and Security Analysis
(2014): 26-36.
"
The National Security Concept of the Republic of Bulgaria
."
National Security Priorities and Factors
(1998): 5.
The National Security Strategy of the Republic of Bulgaria (Sector Security Policies. Financial and Economic Security Policies)
. Approved by the National Assembly Decision of 25 February 2011, State Gazette, no. 1 ed., 2011.
Feaster, Seth W.
,
Nelson D. Schwartz
, and
Tom Kuntz
.
"
It's All Connected: A Spectators Guide to the Euro Crisis
."
New York Times
(2011).
Slatinski, Nickolay
.
On Five Levels of Security
. Sofia: Military publishing house, 2010.
Dobbs, Richard
,
Jonathan Woetzel
,
Susan Lund
, and
Mina Mutafchieva
.
Debt and (not much) deleveraging
. McKinsey Global Institute, 2015.
Yordanova, Gergana
.
Sovereign Debt Modeling Within the Context of the National Security Policy of the Republic of Bulgaria
. Vol. Dissertation. Sofia: Central Research and Technical Library, 2016.
Deriglazova, Larisa
.
"
Asymmetric character of contemporary conflicts
."
Geopolitics Magazine
(2010).
Christie, Paul
.
Ukraine`s fate no one cares
In
Economic Bulletin
. Bremen, Lower Saxony, Germany: Professional Public Conversation by the European, 2014.
Stanev, Zhivko
.
"
Paradigm of Geo-economics: Global Moving Power in XXI century
."
Geopolitics Magazine
3 (2006).
Cielen, Davy
,
Arno D. B. Meysman
, and
Mohamed Ali
.
Introducing Data Science: Big Data, Machine Learning, and More, Using Python Tools
. Shelter Island, NY: Manning, 2016.
Lescovec, Jure
,
Anand Rajaraman
, and
Jeffrey D. Ullman
.
Mining of Massive Datasets
. Second ed. Cambridge: Cambridge University Press, 2014.
McIlwraith, Douglas G.
,
Haralambos Marmanis
, and
Dmitry Babenko
.
Algorithms of the Intelligent Web
. Second ed. Shelter Island, NY: Manning, 2016.
Russell, Stuart
, and
Peter Norvig
.
Artificial Intelligence: A Modern Approach
. Third edition. Harlow, Essex, UK: Pearson Education, 2014.
Cederberg, Aapo
, and
Pasi Eronen
.
"
How Can Societies Be Defended Against Hybrid Threats?
"
Strategic Security Analysis
9 (2015).
Pages
« първа
‹ предишна
…
278
279
280
281
282
283
284
285
286
…
следваща ›
последна »
461382 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance