Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Ubuntu documentation
. Instalation/System Requirements, 2020.
Build an easy RDP Honeypot with Raspberry PI 3 and Observe the Infamous Attacks
. Medium.com, 2019.
RPi HardwareHistory
. RPi Hub, 2020.
Cenys, Antanas
,
Darius Rainys
,
Lukas Radvilavicius
, and
Andrej Bielko
.
"
Development of Honeypot System Emulating Functions of Database Server
." In
RTO IST Symposium on “Adaptive Defence in Unclassified Networks”
. Toulouse, France, 2004.
Fan, Wenjun
,
Zhihui Du
,
David Fernandez
, and
Víctor A. Villagrá
.
"
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey
."
IEEE Systems Journal
12, no. 4 (2018): 3906-3919.
Oudot, Laurent
.
Wireless Honeypot Countermeasures
. Broadcom, 2004.
Streif, Rudolf
.
Microcontroller versus System-on-Chip in Embedded System Designs
. CTO - ibeeto, 2019.
HoneyESP
. MIT licensed, 2020.
SQLite3 Arduino library for ESP32, Apache 2.0 licensed
., 2020.
Tagarev, Todor
.
Digital Transformation, Cyber Security and Resilience, Information & Security: An International Journal
., 2019.
Tagarev, Todor
,
Krassimir Atanassov
,
Vyacheslav Kharchenko
, and
Janusz Kasprzyk
.
Digital Transformation, Cyber Security and Resilience of Modern Societies
. Cham: Springer, 2020.
Shalamanov, Velizar
,
Nikolai Stoianov
, and
Yantsislav Yanakiev
.
DIGILIENCE 2020: Governance, Human Factors, Cyber Awareness, Information & Security: An International Journal
., 2020.
Kahn, Herman
.
On Thermonuclear War
. Princeton: Princeton University Press, 1960.
Doyle, James E.
.
"
Why Eliminate Nuclear Weapons?
"
Survival
55, no. 1 (2013): 7-34.
de Castella, Tom
.
How Did We Forget about Mutually Assured Destruction?
. BBC News, 2012.
Cox, Jessica
.
"
Nuclear Deterrence Today
."
NATO Review
(2020).
Lunn, Simon
, and
Nicholas Williams
.
The Demise of the INF Treaty: What Are the Consequences for NATO
In
Policy Brief, European Leadership Network
., 2019.
Reif, Kingston
.
"
New START at a Glance
." (2020).
Hodges, Ben
,
Janusz Bugajski
, and
Peter B. Doran
.
Securing the Suwałki Corridor: Strategy, Statecraft, Deterrence, and Defense
. Washington, DC: Center for European Policy Analysis, 2018.
Lanoszka, Alexander
.
"
Russian Hybrid Warfare and Extended Deterrence in Eastern Europe
."
International Affairs
92, no. 1 (2016): 175-195.
Radin, Andrew
.
Hybrid Warfare in the Baltics: Threats and Potential Responses
. Santa Monica, CA: RAND, 2017.
Apps, Peter
.
Commentary: Putin’s Nuclear-tipped Hybrid War on the West
. Reuters, 2018.
Gressel, Gustav
.
Protecting Europe against Hybrid Threats
In
Policy Brief
. European Council on Foreign Relations, 2019.
Davis, Paul K.
.
"
Deterrence, Influence, Cyber Attack, and Cyber War
."
New York University Journal of International Law and Politics
47, no. 2 (2014): 327-355.
Hammond, Martin
.
The Peloponnesian War
. Oxford: Oxford University Press, 2009.
Pages
« първа
‹ предишна
…
445
446
447
448
449
450
451
452
453
…
следваща ›
последна »
497954 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance