Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Garamone, Jim
.
Dunford: Global Security Environment Has Implications for Joint Force
. DoD News, 2016.
Corera, Gordon
.
Could Russia and West be Heading for Cyber-war?
. BBC News, 2018.
Strategic Survey 2016: The Annual Review of World Affairs
. London: IISS, 2016.
Securing the Edge: Surveying the Vulnerabilities in the Federal Government’s Inter-net of Things
In
Research report
. Government Business Council, Brocade Communications System, 2017.
Kostaki, Irene
.
EU Struggles to Balance Trans-Atlantic Ties with Exposure to Huawei
. Brussels: New Europe, 2019.
Wheeler, Tom
.
Moving from ‘Secret Sauce’ to Open Standards for 5G
. Brookings Global Eye, 2020.
Zhao, Christina
.
China Building Artificial Intelligence–Powered Nuclear Submarine That Could Have 'Its Own Thoughts,' Report Says
. Newsweek, 2018.
Brundage, Miles
,
Shahar Avin
, and
Jack Clark
.
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
. Future of Humanity Institute – University of Oxford, Centre for the Study of Existential Risk, Center for a New American Security, Electronic Frontier Foundation, Open AI, 2018.
New Cryptography Must Be Developed and Deployed Now
. Homeland Security News Wire, 2018.
Forum, World Economic
.
The Global Risks Report 2019
., 2019.
Berlin Wants First Use of EU Cyber Sanctions on Russia
. EU Observer, 2020.
Nakashima, Ellen
.
"
Trump Approved Cyber-strikes Against Iranian Computer Database Used to Plan At-tacks on Oil Tankers
."
Washington Post
(2019).
Futter, Andrew
.
What Does Cyber Arms Control Look Like? Four Principles for Managing Cyber Risk
In
Policy Brief
. European Leadership Network, 2020.
Karev, Maksim
.
"
Risk Management as a Part of The Security Strategic Management
."
Science & Technologies
V, no. 7 (2015).
Borissova, Daniela
,
Delyan Keremedchiev
, and
Georgi Tuparov
.
"
Multi-Criteria Model for Questions Selection in Generating e-Education Tests Involving Gamification
."
TEM Journal
2 (2020): 779-785.
Borissova, Daniela
,
Magdalena Garvanova
,
Zornitsa Dimitrova
,
Andrea Pandulis
, and
Ivan Garvanov
.
"
Decision Support Framework for Composing of Different Questionnaires Based on Business Model with Optimization
." In
Integrated Uncertainty in Knowledge Modelling and Decision Making
. Springer Nature, 2020.
Borissova, Daniela
,
Dilian Korsemov
, and
Nina Keremedchieva
.
Generalized Approach to Support Business Group Decision-Making by Using of Different Strategies
In
International Conference on Computer Information Systems and Industrial Management CISIM 2020: Computer Information Systems and Industrial Management
., 2020.
Regulations for the Life Cycle Management of the Command, Control, Communications, Computers, and Intelligence Systems (C4I) in the Ministry of Defense and the Bulgarian Armed Forces
. Sofia: Military Publishing House, 2000.
Maximizing the Success of Chief Information Officers: Learning from Leading Organizations
In
Executive Guide
. United States General Accounting Office, 2001.
Lawry, Rachel
,
Dianne Waddell
, and
Mohini Singh
.
Roles, Responsibilities and Futures of Chief Information Officers (CIOs) in the Public Sector
., 2007.
Gruber, William H.
.
Strategic Information for Competitive Advantage
., 2019.
Synnott, William R.
, and
William H. Gruber
.
Information Resource Management: Opportunities and Strategies for the 1980s
. New York: Wiley Interscience, 1981.
Peppard, Joe
.
"
Unlocking the Performance of the Chief Information Officer (CIO)
."
California Management Review
52, no. 4 (2010): 5.
What Exactly Does a Chief Information Officer Do?
In
interview with Paul Burfitt
. Computer Weekly, 2005.
CIO Interview: David Cooper, CTIO of Mitie
. Horizon CIO Network, 2018.
Pages
« първа
‹ предишна
…
450
451
452
453
454
455
456
457
458
…
следваща ›
последна »
497958 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance