Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Jurgała, Piotr
,
Tytus Kurek
, and
Marcin Niemiec
.
"
Preserving Privacy of Security Services in the SecaaS Model
."
Information & Security: An International Journal
53, no. 1 (2022): 47-64 .
Gaidarski, Ivan
, and
Pavlin Kutinchev
.
"
Transformation of UML Design Models of Information Security System into Agent-based Simulation Models
."
Information & Security: An International Journal
53, no. 1 (2022): 65-77 .
Iliev, Iliyan
, and
Ivan Blagoev
.
"
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
."
Information & Security: An International Journal
53, no. 1 (2022): 78-88 .
Markov, Dilyan
,
Alexander Kolev
, and
Vania Ivanova
.
"
An Enhanced Solution for Automated Fire Control Systems
."
Information & Security: An International Journal
53, no. 1 (2022): 89-101.
Pasic, Aljosa
.
"
Governance Mesh Approach for Cybersecurity Ecosystem
."
Information & Security: An International Journal
53, no. 1 (2022): 105-130.
Mladenova, Irena
,
Velizar Shalamanov
, and
Antoniya Shalamanova-Filipova
.
"
Governance Consulting Services and Tools: Transition Planning and Implementation for Collaborative Networked Organisations in the Cyber Domain
."
Information & Security: An International Journal
53, no. 1 (2022): 131-146.
Penchev, Georgi
, and
Velizar Shalamanov
.
"
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain
."
Information & Security: An International Journal
53, no. 1 (2022): 147-160.
Sharkov, George
,
Christina Todorova
,
Georgi Koykov
, and
Ivan Nikolov
.
"
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience
."
Information & Security: An International Journal
53, no. 2 (2022): 287-302.
de la Vallée, Paloma
,
Georgios Iosifidis
, and
Wim Mees
.
"
Cyber Red Teaming: Overview of Sly, an Orchestration Tool
."
Information & Security: An International Journal
53, no. 2 (2022): 273-286.
Tremori, Alberto
,
Sasha B. Godfrey
,
Luca Berretta
,
Arnau Carrera Viñas
,
Pavlina Nikolova
, and
Iliyan Hutov
.
"
Simulation-Based Training with Gamified Components for Augmented Border Protection
."
Information & Security: An International Journal
53, no. 2 (2022): 255-272.
Mygal, Valeriy
,
Galyna Mygal
, and
Stanislav Mygal
.
"
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor
."
Information & Security: An International Journal
53, no. 2 (2022): 240-252.
Frisk, Ilona
,
Ilkka Tikanmäki
, and
Harri Ruoslahti
.
"
Piloting the ECHO e-Skills and Training Toolkit
."
Information & Security: An International Journal
53, no. 2 (2022): 163-175.
Varbanov, Pavel
.
"
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach
."
Information & Security: An International Journal
53, no. 2 (2022): 177-190.
Polimenov, Ventsislav
,
Katya Dimitrova
,
Irena Mladenova
, and
Kamen Iliev
.
"
The Hackathons as a First Step to Build Digital Competences
."
Information & Security: An International Journal
53, no. 2 (2022): 191-204.
Mednikarov, Boyan
,
Yuliyan Tsonev
,
Borislav Nikolov
, and
Andon Lazarov
.
"
Cyber Hygiene Issues in the Naval Security Environment
."
Information & Security: An International Journal
53, no. 2 (2022): 205-218.
Ronchi, Alfredo M.
.
"
Human Factor, Resilience, and Cyber/Hybrid Influence
."
Information & Security: An International Journal
53, no. 2 (2022): 221-239.
Root, Hilton L.
.
How Networks of Social Cooperation Scale into Civilizations
In
Connections: The Quarterly Journal
. Vol. 20., 2021.
Deng, Xinyang
, and
Wen Jiang
.
"
A framework for the fusion of non-exclusive and incomplete information on the basis of D number theory
."
Applied Intelligence
(2022).
Федонюк, Сергій
.
Міжнародні аспекти безпеки кіберпростор
. Вежа-Друк: Луцьк , 2022.
Tibor, Serbakov Márton
.
A szélsőséges terrorista csoportok internethasználatának elemzése
. Vol. PHD. Egyetem Pécsi Tudományegyetem, 2022.
Petrova, Valentina Markova
.
Analytical hierarchical process for assessment and selection of secure software solutions
. Varna, Bulgaria: Nikola Vaptsarov Naval Academy , 2022.
Rana, Abhisekh
,
Hamdi Kavak
,
Andrew Crooks
,
Sean Luke
,
Carlotta Domeniconi
, and
Jim Jones
.
Mitigation of Optimized Pharmaceutical Supply Chain Disruptions by Criminal Agents
In
International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation
., 2022.
Alkan, Erkan
.
Birleşik Krallığın dış politikasında yumuşak güç aracı olarak burs programları
. Vol. masterThesis. Batman: Batman Üniversitesi Lisansüstü Eğitim Enstitüsü, 2022.
Lewandowsky, Stephan
, and
John Cook
.
The Conspiracy Theory Handbook
. NSC OPIR, 2020.
K¨onig, Philip
,
Fabian Obermann
,
Kevin Mallinger
, and
Alexander Schatten
.
Root Cause Analysis of Software Aging in Critical Information Infrastructure
., 2022.
Pages
« първа
‹ предишна
…
508
509
510
511
512
513
514
515
516
следваща ›
последна »
390493 reads
Last updated:
Monday, 01 December 2014
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance