Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Jimoh, Rasheed Gbenga
,
Olayinka Olufunmila Olusanya
,
Joseph Bamidele Awotunde
,
Agbotiname Lucky Imoize
, and
Cheng-Chi Lee
.
"
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases
."
Future Internet
14, no. 305 (2022).
Ашурков, И.С.
,
Н.А. Лешко
, and
А.В. Тимошенко
.
"
Современное Состояние и Перспективы Развития Многообзорных Методов Траекторной Обработки Радиолокационной Информации при Использовании TBD-Технологии
."
Вестник Воздушно-Космической Обороны
3, no. 35 (2022): 50-61.
Alzarooni, Abdelrahim
, and
Mohammed Lataifeh
.
Exploring the relationship between IT competence and digital transformation within government projects in the UAE
In
2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)
. Dalian, China, 2022.
Dimitrov, Michael Minev
.
"
Analysis of strategic stakeholders in the Western Balkans
."
Security and Defence Quarterly
(2022).
Yevseiev, Serhii
,
Ruslan Hryshchuk
,
Kateryna Molodetska
,
Mariia Nazarkevych
, and
Volodymyr Hrytsyk
.
Modeling of Security Systems for Critical Infrastructure Facilities
., 2022.
Kouka, Marianna
, and
Mariah Cristina Magallanes
.
Technological Trivergence and International Trade: A Literature Review
. Harvard University, 2022.
Соколов, Сергей Валер
.
"
Государственная Информационная Политика в Библиотечной Отрасли Украины на Современном Этапе
."
Библиография и Книговедение
4, no. 441 (2022): 141-160.
Vivek, Yelleti
,
Vadlamani Ravi
,
Abhay Anand Mane
, and
Laveti Ramesh Naidu
.
"
Explainable Artificial Intelligence and Causal Inference based ATM Fraud Detection
."
arXiv preprint arXiv:2211.10595
(2022).
Hillman, Velislava
.
The State of Cybersecurity in Education: Voices from the EdTech Sector
. London: Media@LSE, London School of Economics and Political Science ("LSE"), 2022.
Ivančík, Radoslav
, and
Jana Müllerová
.
Dezinformácie ako hybridná hrozba šírená prostredníctvom sociálnych sietí
. Agentúrou na podporu výskumu a vývoja, 2022.
Bladaitė, Neringa
.
Visuomeninio saugumo neapibrėžtumas: NATO mažųjų valstybių atvejis
. Vol. Daktaro disertacija socialiniai mokslai,politikos mokslai. Vilnius : Vilniaus Universitetas, 2022.
Sharkov, George
.
"
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
."
Information & Security: An International Journal
49 (2021): 49-69 .
Sharkov, George
.
"
A System-of-Systems Approach to Cyber Security and Resilience
."
Information & Security: An International Journal
37 (2017): 69-94.
Sharkov, George
, and
Christina Todorova
.
"
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
."
Information & Security: An International Journal
37 (2017): 95-102.
Blagoev, Ivan
.
Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems
., 2022.
Blagoev, Ivan
.
Application of Time Series Techniques for Random Number Generator Analysis
In
XXII Int. Conference DCCN
. Moscow, Russia, 2019.
Calzarossa, M.C.
, and
L. Massari
.
Analysis of header usage patterns of HTTP request messages
In
16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems
., 2014.
Hodges, J.
,
C. Jackson
, and
A. Barth
.
HTTP strict transport security
., 2012.
Yusof, I.
, and
A.S.K. Pathan
.
"
Mitigating cross-site scripting attacks with a content security policy
."
Computer
3, no. 49, (3) (2016): 56-63.
General Security Requirements for Equipment Using the Data Encryption Standard
., 1982.
Hankerson, Darrel
,
Alfred J. Menezes
, and
Scott Vanstone
.
"
Guide to Elliptic Curve Cryptography
."
Springer Professional Computing
(2004).
Stuttard, Dafydd
, and
Marcus Pinto
.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
., 2007.
Meyers, Mike
,
Scott Jernigan
, and
Mike Meyers
.
CompTIA Security+ Certification Guide
. 3rd ed. , Third Edition (Exam SY0-601) 3rd Edition, , 2021.
Tennoe, Mariam T.
, and
Susan F. Henssonow
.
Padding (Cryptography) Paperback
., 2010.
Gaurav, Akshat
, and
Brij B. Gupta
.
"
Identificación de transacciones fraudulentas en línea y protección: técnicas de vanguardia
."
ESIC Digital Economy and Innovation Journal
1, no. 3 (2022).
Pages
« първа
‹ предишна
…
511
512
513
514
515
516
517
518
519
…
следваща ›
последна »
472645 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance