Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Rajamäki, Jyri
, and
Aarne Hummelholm
.
"
Ethical Resilience Management Framework for Critical Healthcare Information Infrastructure
."
WSEAS Transactions on Biology and Biomedicine
19, no. 9 (2022): 67-76.
Owens-Horton, Allyson L.
.
Work–Life Balance in Parent Teachers During COVID-19
In
School of Behavioral Sciences
. Vol. Doctor of Education . Liberty University, 2022.
Valliou, Maria
,
Alexandros Chronis
,
Panos Kotsampopoulos
,
Bahaa Eltahawy
,
Tero Vartiainen
,
Mike Mekkanen
,
Andrejs Romānovs
,
Jana Bikovska
,
Jānis Pekša
,
Rūta Pirta-Dreimane
et al.
Strategy for Cybersecurity Education in Smart Grids
In
Cybersecurity Curricula Recommendations for Smart Grids (CC-RSG) Erasmus+ Strategic Partnership Project
., 2022.
Kashyapa, Kamal
,
Robin Thakur
,
Raj Kumar
, and
Sunil Kumar
.
"
Feasibility analysis for conversion of existing traditional watermills in Western Himalayan region of India to micro-hydropower plants using a low head Archimedes screw turbine for rural electrification
."
International Journal of Ambient Energy
43, no. 1 (2022).
Fischerkeller, Michael P.
,
Emily O. Goldman
, and
Richard J. Harknett
.
Cyber Persistence Theory: Redefining National Security in Cyberspace
. Oxford University Press, 2022.
Stefanova, Marieta
.
"
Quality Management Costs in Logistics
." In
Quality Control
., 2022.
Petrivskyi, Volodymyr
,
Oleksii Bychkov
,
Viktor Shevchenko
,
Vasyl Martsenyuk
, and
Marcin Bernas
.
"
A Method for Maximum Coverage of the Territory by Sensors with Minimization of Cost and Assessment of Survivability
."
Applied Sciences
12, no. 6 (2022).
Mygal, Valeriy
,
Galyna Mygal
, and
Stanislav Mygal
.
"
Cognitive Space for Online and Offline Learning: A Convergent Approach
."
The Educational Review, USA
6, no. 4 (2022): 109-123.
Aggarwal, Vivek
,
Snigdha Dash
,
Prashant Dev Yadav
, and
Aditya Kumar Gupta
.
"
Role of ICT enabled Cloud Learning Management System tools in Fostering Entrepreneurship Amongst Youth
." In
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)
. Gautam Buddha, 2022.
Moon, Bo Ra
,
Seung Min Lee
, and
Won Jae Seo
.
"
Contemporary Safety Management of Virtual Golf in South Korea
."
Journal of Sport and Applied Science
6, no. 1 (2022): 01-04.
Ashraf, Imran
,
Yongwan Park
,
Soojung Hur
,
Sung Won Kim
,
Roobaea Alroobaea
,
Yousaf Bin Zikria
, and
Summera Nosheen
.
"
A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry
."
IEEE Transactions on Intelligent Transportation Systems
(2022): 1-14.
Verma, Pradeep
, and
Poornima Tyagi
.
Credit Card Fraud Transaction Classification Using Improved Class Balancing and Support Vector Machines
In
Recent Innovations in Computing: Proceedings of ICRIC 2021
. Vol. 2. Springer Nature, 2021.
Borissova, Daniela
,
Zornitsa Dimitrova
,
Naiden Naidenov
, and
Radoslav Yoshinov
.
Integrated Approach to Assessing the Progress of Digital Transformation by Using Multiple Objective and Subjective Indicators
In
Research Challenges in Information Science. RCIS 2022. Lecture Notes in Business Information Processing.
. Vol. 446. Springer, Cham, 2022.
Puchkov, Oleksandr
,
Dmytro Lande
,
Ihor Subach
,
Mykhailo Boliukh
, and
Dmytro Nahornyi
.
"
OSINT investigation to detect and prevent cyber attacks and cyber security incidents
."
Information Technology and Security
9, no. 2 (2021).
Henriksson, Johannes
.
Cyber Supply-Chain Security Challenges in the Context of Interorganizational Collaboration
In
School of Business
. Vol. Master Thesis. Örebro University, 2021.
Tarchia, Livio
,
Pietro Crescenzo
, and
Kristian Talamonti
.
"
Prevalence and predictors of mental distress among Italian Red Cross auxiliary corps: A cross-sectional evaluation after deployment in anti-COVID-19 operations
."
Military Psychology
(2022).
Ostrovsky, Aaron
.
Applying Defense-In-Depth to Defend Against Russian State-Sponsored Disinformation Campaigns
. Vol. Master of Science in Cybersecurity. Utica University, 2022.
Gramm, Joshua D.
, and
Brian A. Branagan
.
Neurowar is Here!
. Monterey, CA: Naval Postgraduate School, 2021.
Ottuh, John Arierhi
.
"
The 3Cs of Colonisation and their Impacts on African Slavery: The Nigeria’s Experience
."
Black Theology: An International Journal
20, no. 1 (2022).
Shalamanov, Velizar
,
Ivan Blagoev
, and
Iliyan Iliev
.
Level of maturity of the Cybersecurity of the infrastructure in the domain iict.bas.bg
In
IT4Sec Reports
., 2022.
Shalamanov, Velizar
,
Ivaylo Blagoev
,
Gergana Vassileva
, and
Silvia Matern
.
Infrastructure for e-Learning on ICT (digital) competencies in IICT-BAS
In
IT4Sec Reports
., 2022.
Taşer, Pelin Yıldırı
, and
Fatma Bozyigit
.
"
Machine Learning Applications for Fraud Detection in Finance Sector
." In
The Impact of Artificial Intelligence on Governance, Economics and Finance
, 121-146. Springer Nature, 2022.
Mladenova, Irena
, and
Velizar Shalamanov
.
"
Institution Building and Change Management Framework for ICT/Cyber Collaborative Network Organizations
."
Годишник на Стопанския факултет на СУ „Св. Климент Охридски“
21 (2022): 107-129.
Lukichev, P. N.
, and
A. A. Ali
.
"
Consciousness Management by Extremist Organizations With the Means of Internet Communication
."
Humanities of the South of Russia
11 (54), no. 2 (2022).
Lee, Nevada
.
UN Missions and Their Failures: How Collaboration with Military Force Complicates UN Inter ce Complicates UN Intervention in Ar ention in Areas of Conflict eas of Conflict
. Vol. Bachelor of Arts. Claremont Colleges, 2022.
Pages
« първа
‹ предишна
…
504
505
506
507
508
509
510
511
512
…
следваща ›
последна »
472647 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance