Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Alatalo, Janne
,
Joni Korpihalkola
,
Tuomo Sipola
, and
Tero Kokkonen
.
"
Chromatic and spatial analysis of one-pixel attacks against an image classifier
."
rXiv preprint arXiv:2105.13771
(2021).
Ghoshal, Souvik
,
Debkanya Bose
, and
Koushik Deb
.
A Comparative Study on Credit Card Fraud Detection
., 2021.
Umar, Mubarak Albarka
,
Zhanfang Chen
, and
Yan Liu
.
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
In
Information & Security: An International Journal
. Vol. 49., 2021.
Georgiev, Venelin
.
An Organizational Cybersecurity Program
In
IT4Sec Reports
., 2021.
Cisco
.
Cybersecurity Management Program Whitepaper
., 2017.
Tyler Technologies
.
Information Security/Cybersecurity Program
., 2018.
ACME Business Consulting, LLC
.
Digital Security Program (DSP)
., 2018.
Federal Communications Commision
.
Small Biz Cyber Planner 2.0
., 2012.
Federal Communications Commission
.
Cyber Security Planning Guide
. San Jose, CA: NBU Company, 2021.
Maschovitis, Chris
.
Cybersecurity Program Development for Business
. Wiley, 2018.
Bandos, Tim
.
Incident Responder’s Field Guide
. Waltham, MA: Digital Guardian, 2016.
Cole, Eric
.
Insider Threats and the Need for Fast and Directed Response—A SANS Survey
. Bethesda, MD: SANS Institute, 2016.
Chapple, Mike
,
James Stewart
, and
Darril Gibson
.
Certified Information System Security Professional
., 2018.
.
Основи на киберсигурността
. София: Авангард, 2019.
Alymbaeva, Aida
, and
Philipp H. Fluri
.
"
Lessons from the Post-Totalitarian Transformation of Intelligence Services
."
Connections: The Quarterly Journal
20, no. 1 (2021): 5-7.
Gogolewska, Agnieszka
.
"
Transformation of State Security and Intelligence Services in Poland – A Job Still Unfinished
."
Connections: The Quarterly Journal
20, no. 1 (2021): 9-32.
Hugyik, Andras
.
"
Lessons Learned from Military Intelligence Services Reform in Hungary
."
Connections: The Quarterly Journal
20, no. 1 (2021): 33-49.
Fluri, Philipp
, and
Leonid Polyakov
.
"
Intelligence and Security Services Reform and Oversight in Ukraine – An Interim Report
."
Connections: The Quarterly Journal
20, no. 1 (2021): 51-59.
Segell, Glen
.
"
Infogate Influences on Reforms of South Africa’s Intelligence Services
."
Connections: The Quarterly Journal
20, no. 1 (2021): 61-74.
A., Mufti Makarim
.
"
Indonesian Intelligence Reform: Recent Challenges and Opportunities for Encouraging Democratic and Professional Intelligence
."
Connections: The Quarterly Journal
20, no. 1 (2021): 75-90.
Caparini, Marina
, and
Agnieszka Gogolewska
.
"
Governance Challenges of Transformative Technologies
."
Connections: The Quarterly Journal
20, no. 1 (2021): 91-100.
Tovares, Alla
.
"
Online Political Trolling as Bakhtin's Carnival: Putin's “Discrowning” by Pro-Ukrainian Commenters
." In
Approaches to Discourse Analysis
., 2021.
Patra, Raj Kishore
, and
Neha Pandey
.
"
Disinformation on Novel Coronavirus (COVID-19): A Content Analysis of News Published on Fact-Checking Sites in India
."
DESIDOC Journal of Library & Information Technology
41, no. 4 (2021): 275-283.
Erlich, Aaron
,
Calvin Garner
,
Gordon Pennycook
, and
David G. Rand
.
Does Analytic Thinking Insulate Against Pro-Kremlin Disinformation? Evidence from Ukraine
., 2021.
Oivo, Teemu
.
"
Kremlin ”vapaan sanan” saattajat? Suomalaiset verkkomediat kansainvälisen uutisvirran portilla
."
Media & viestintä
44, no. 2 (2021): 117-138.
Pages
« първа
‹ предишна
…
492
493
494
495
496
497
498
499
500
…
следваща ›
последна »
496971 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance