Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Higgins, Andrew
.
"
Two Border Cities Share Russian History – and a Sharp European Divide
."
The New York Times
(2017).
Nguyen, Kien C.
,
Tansu Alpcan
, and
Tamer Basar
.
Security Games with Incomplete Information
In
2009 IEEE International Conference on Communications
. Dresden: Germany, 2009.
Rass, Stefan
,
Sandra König
, and
Stefan Schauer
.
"
Defending Against Advanced Persistent Threats Using Game-Theory
."
PLoS ONE
12, no. 1 (2017).
Noack, Rick
.
"
The Dutch Were a Secret U.S. Ally in War against Russian Hackers, Local Media Reveal
."
The Washington Post
(2018).
Tikk, Eneken
,
Kristine Hovhannisyan
,
Mika Kerttunen
, and
Mirva Salminen
.
Cyber Conflict Fact Book: Effect-Creating State-on-State Cyber Operations
. Jyväskylä: Cyber Policy Institute, 2019.
de Vries, Gerard
,
Imrat Verhoeven
, and
Martin Boeckhout
.
"
Governing a Vulnerable Society: Toward a Precaution-Based Approach
." In
Vulnerability in Technological Cultures: New Directions in Research and Governance
, 225. Cambridge, MA: MIT Press, 2014.
Wilkie, Robert
.
"
Hybrid Warfare: Something Old, Not Something New
."
Air and Space Power Journal
23, no. 4 (2009): 13-18.
Karagiannis, Emmanuel
.
"
The Russian Interventions in South Ossetia and Crimea Compared: Military Performance, Legitimacy and Goals
."
Contemporary Security Policy
35, no. 3 (2014): 400-420.
Boot, Max
.
The Road Not Taken: Edward Lansdale and the American Tragedy in Vietnam
. New York: Liveright Publishing, 2018.
Langner, Ralph
.
"
Stuxnet: Dissecting a Cyberwarfare Weapon
."
,” IEEE Security & Privacy
9, no. 3 (2011): 49-51.
Conklin, William Arthur
, and
Anne Kohnke
.
Cyber Resilience: An Essential New Paradigm for Ensuring National Survival
In
13th International Conference on Cyber Warfare and Security ICCWS 2018
. Washington D.C., USA: National Defence University, 2018.
Dunn, Sarah
, and
Sean Wilkinson
.
"
Hazard Tolerance of Spatially Distributed Complex Networks
."
Reliability Engineering & System Safety
157 (2017): 1-12.
Kim, Dong Hwan
,
Daniel A. Eisenberg
,
Yeong Han Chun
, and
Jeryang Park
.
"
Network Topology and Resilience Analysis of South Korean Power Grid
."
Physica A: Statistical Mechanics and Its Applications
465 (2017): 13-24.
Gallucci, Maria
.
"
Rebuilding Puerto Rico’s Grid
."
IEEE Spectrum
55, no. 5 (2018): 30-38.
Mikellidou, Cleo Varianou
,
Louisa Marie Shakou
,
Georgios Boustras
, and
Christos Dimopoulos
.
"
Energy Critical Infrastructures at Risk from Climate Change: A State of the Art Review
."
Safety Science
110, no. Part C (2018): 110-120.
Vrajolli, Mentor
.
Kosovo Security Barometer
. Seventh Edition. Pristina: Kosovar Centre for Security Studies, 2018.
Mosher, David E.
,
Beth E. Lachman
,
Michael D. Greenberg
,
Tiffany Nichols
,
Brian Rosen
, and
Henry H. Willis
.
Green Warriors: Army Environmental Considerations for Contingency Operations from Planning Through Post-Conflict
. Santa Monica, CA: Rand Corporation, 2008.
Putin’s Asymmetric Assault on Democracy in Russia and Europe: Implications for U.S. National Security
. U.S. Government Publishing Office, 2018.
Concept of the Development of the Security and Defense Sector of Ukraine
. President of Ukraine, 2016.
Basic Principles for the Cybersecurity of Ukraine
In
The Law of Ukraine
., 2017.
The National Security Strategy of Ukraine
., 2015.
Stubbs, Jack
.
Hackers Accused of Ties to Russia Hit Three East European Companies: Cybersecurity Firm
. Reuters, 2018.
Zetter, Kim
.
Russia’s Hacking Attack on the Ukrainian Power System: How It Was
. Texty.org.ua, 2018.
Middleton, Bruce
.
A History of Cyber Security Attacks: 1980 to Present
. New York: Auerbach Publications, 2017.
GreyEnergy: A Successor to BlackEnergy
In
White Paper
., 2018.
Pages
« първа
‹ предишна
…
446
447
448
449
450
451
452
453
454
…
следваща ›
последна »
498122 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance