Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Jiang, Tianjiao
.
"
The Shift of China’s Strategic Thinking on Cyberwarfare Since the 1990s
."
Journal of Chinese Political Science
(2022).
Baraković, Sabina
, and
Jasmina Baraković Husić
.
"
Cyber hygiene knowledge, awareness, and behavioral practices of university students
."
Information Security Journal: A Global Perspective
(2022).
Amulya, Alamanda
,
Ragu Leela Venk Sai
,
Yaga Srivalli
,
Kunche Kavya
, and
Kalidindi Jyothika
.
"
A Novel Approach for Analysing and Predicting the Online Money Transactions Using Machine Learning Auto Encoders
."
Journal of Engineering Sciences
13 (2022).
Notarmuzi, Daniele
.
Information Diffusion in Online Social Media
In
n Luddy School of Informatics, Computing, and Engineering
. Vol. Doctor of Philosophy. Indiana University, 2022.
Alanazi, Marfua
,
Mark Freeman
, and
Holly Tootell
.
"
Exploring the factors that influence the cybersecurity behaviors of young adults Author links open overlay panel
."
Computers in Human Behavior
136 (2022).
Moturi, Ievgeniia
,
Livia Dzupinova
, and
Michael Christensen
.
Incident Information Sharing in the Danish Critical Infrastructure: Proposal of a Conceptual Centralised Framework
In
Electronics systems
. Vol. Master Thesis. Aalborg University, 2022.
Hall, Lynne
,
Samiullah Paracha
,
Gill Hagan-Green
,
Catrina Ure
, and
Phil Jackman
.
Cyber Eyes Wide Open: Creative Collaboration between Artists, Academics & Cyber Security Practitioners
In
35th International BCS Human-Computer Interaction Conference
. Keele: Keele University, 2022.
Caison, Shawn
.
The Relationship between Consumer Awareness of Information Security, Age, and Internet of Things Product Acquisitions
In
School of Business, Technology, and Health Care Administration
. Vol. Doctor of Philosophy. Capella University, 2022.
Krisnata, Rachmanu
,
Agus H. S. Reksoprodjo
, and
Surryanto Djoko Waluyo
.
"
Strategi Pengembangan Kapabilitas Siber Pertahanan Untuk Menghadapi Peperangan Siber (Studi Kasus Pada Pushansiber Kemhan Ri 2020-2021)
."
NUSANTARA : Jurnal Ilmu Pengetahuan Sosial
9, no. 6 (2022).
Alatalo, Janne
,
Tuomo Sipola
, and
Tero Kokkonen
.
Detecting One-Pixel Attacks Using Variational Autoencoders
., 2022.
Chen, Liao
,
Ning Jia
,
Hongke Zhao
,
Yanzhe Kang
,
Jiang Deng
, and
Shoufeng Ma
.
"
Refined analysis and a hierarchical multi-task learning approach for loan fraud detection
."
Journal of Management Science and Engineering
(2022).
Wu, Di
, and
Efe Sevin
.
"
Neither External nor Multilateral: States’ Digital Diplomacy During Covid-19
."
Journal of Public Diplomacy
2, no. 1 (2022): 69-96.
Karlberg, Anton
.
Utilizing games as a tool to increase cybersecurity awareness in organizations: A systematic literature review
In
School of Informatics
. Vol. Bachelor. University of Skövde, 2022.
Noang, Edmondus Iswenyo
.
"
Jaga Diri di Baltik
."
Global Political Studies Journal
6, no. 1 (2022).
Farheen, Meraj
,
Pawankumar Sharma
, and
Bibhu Dash
.
"
Prevention of Phishing Attacks Using AI-Based Cybersecurity Awareness Training
."
International Journal of Smart Sensor and Adhoc Network
3, no. 3 (2022): 61-72.
Yang, Peijie
,
Lusheng Jia
,
Zhuang Kang
, and
Jichuan Kang
.
"
Research on risk assessment method of steel catenary riser based on information fusion
."
Ocean Engineering
259,, no. 1 (2022).
Angeli, Franco
.
Relazioni sociali e crimine organizzato : il caso di una rete ‘ndranghetista
., 2022.
Zenggang, Xiong
,
Zeng Mingyang
,
Zhang Xuemin
,
Zhu Sanyuan
,
Xu Fang
,
Zhao Xiaochao
,
Wu Yunyun
, and
Li Xiang
.
"
Social Similarity Routing Algorithm based on Socially Aware Networks in the Big Data Environment
."
Journal of Signal Processing Systems
(2022).
Latvala, Outi–Marja
,
Ivo Emanuilov
,
Tatu Niskanen
,
Pia Raitio
,
Jarno Salonen
,
Diogo Santos
, and
Katerina Yordanova
.
Proof-of-Concept for a Granular Incident Management Information Sharing Scheme
In
2022 IEEE World AI IoT Congress (AIIoT)
. Seattle, WA, USA, 2022.
Phuong, Chang
.
Teaching cybersecurity: a project-based learning and guided inquiry collaborative learning approach
. Vol. Doctor of Philosophy in Computational Science. University of Tennessee at Chattanooga Chattanooga, Tennessee , 2022.
Saeed, Khalid
, and
Jiří Dvorský
.
Computer Information Systems and Industrial Management
In
21st International Conference CISIM 2022
. Barranquilla, Colombia, 2022.
А.Д., Батагова
, and
Кувыркова Е.А.
.
"
Проблемы эффективности коммуникации российских экспертовмеждународников с обществом и властью
."
Communicology
10, no. 2 (2022): 41-55.
Olmos, Martina Benito
.
The End of the Waves of Modern Terrorism? A Revisionist Analysis on a Fluid Concept
In
Institute of Political Studies, Department of Security Studies
. Vol. Master’s Thesis. Charles University, 2022.
Junior, David Paulo Succ
.
Legitimating violence: military operations within Brazilian borders
. Vol. Doctor of Philosophy in International Relations. São Paulo : Universidade Estadual Paulista “Júlio de Mesquita Filho” (Unesp), Universidade de Campinas (Unicamp), and Pontifícia Universidade Católica de São Paulo (PUC-SP), 2022.
Borissova, Daniela
,
Zornitsa Dimitrova
,
Vasil Dimitrov
,
Radoslav Yoshinov
, and
Naiden Naidenov
.
Digital Transformation and the Role of the CIO in Decision Making: A Comparison of Two Modelling Approaches
In
International Conference on Computer Information Systems and Industrial Management CISIM 2022: Computer Information Systems and Industrial Management
. Barranquilla, Colombia, 2022.
Pages
« първа
‹ предишна
…
506
507
508
509
510
511
512
513
514
…
следваща ›
последна »
468517 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance