Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Erbasli, Seyma Nur Yildir
.
Conversation-Based Assessments: Measuring Student Learning with Human-Like Communication
In
Department of Educational Psychology
. Vol. Doctor of Philosophy. University of Alberta, 2022.
Jimoh, Rasheed Gbenga
,
Olayinka Olufunmila Olusanya
,
Joseph Bamidele Awotunde
,
Agbotiname Lucky Imoize
, and
Cheng-Chi Lee
.
"
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases
."
Future Internet
14, no. 305 (2022).
Hillman, Velislava
.
The State of Cybersecurity in Education: Voices from the EdTech Sector
. London: Media@LSE, London School of Economics and Political Science ("LSE"), 2022.
Vivek, Yelleti
,
Vadlamani Ravi
,
Abhay Anand Mane
, and
Laveti Ramesh Naidu
.
"
Explainable Artificial Intelligence and Causal Inference based ATM Fraud Detection
."
arXiv preprint arXiv:2211.10595
(2022).
Соколов, Сергей Валер
.
"
Государственная Информационная Политика в Библиотечной Отрасли Украины на Современном Этапе
."
Библиография и Книговедение
4, no. 441 (2022): 141-160.
Bladaitė, Neringa
.
Visuomeninio saugumo neapibrėžtumas: NATO mažųjų valstybių atvejis
. Vol. Daktaro disertacija socialiniai mokslai,politikos mokslai. Vilnius : Vilniaus Universitetas, 2022.
Ivančík, Radoslav
, and
Jana Müllerová
.
Dezinformácie ako hybridná hrozba šírená prostredníctvom sociálnych sietí
. Agentúrou na podporu výskumu a vývoja, 2022.
Sharkov, George
.
"
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
."
Information & Security: An International Journal
49 (2021): 49-69 .
Sharkov, George
.
"
A System-of-Systems Approach to Cyber Security and Resilience
."
Information & Security: An International Journal
37 (2017): 69-94.
Sharkov, George
, and
Christina Todorova
.
"
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
."
Information & Security: An International Journal
37 (2017): 95-102.
Tennoe, Mariam T.
, and
Susan F. Henssonow
.
Padding (Cryptography) Paperback
., 2010.
Meyers, Mike
,
Scott Jernigan
, and
Mike Meyers
.
CompTIA Security+ Certification Guide
. 3rd ed. , Third Edition (Exam SY0-601) 3rd Edition, , 2021.
Stuttard, Dafydd
, and
Marcus Pinto
.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
., 2007.
Hankerson, Darrel
,
Alfred J. Menezes
, and
Scott Vanstone
.
"
Guide to Elliptic Curve Cryptography
."
Springer Professional Computing
(2004).
General Security Requirements for Equipment Using the Data Encryption Standard
., 1982.
Yusof, I.
, and
A.S.K. Pathan
.
"
Mitigating cross-site scripting attacks with a content security policy
."
Computer
3, no. 49, (3) (2016): 56-63.
Hodges, J.
,
C. Jackson
, and
A. Barth
.
HTTP strict transport security
., 2012.
Calzarossa, M.C.
, and
L. Massari
.
Analysis of header usage patterns of HTTP request messages
In
16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems
., 2014.
Blagoev, Ivan
.
Application of Time Series Techniques for Random Number Generator Analysis
In
XXII Int. Conference DCCN
. Moscow, Russia, 2019.
Blagoev, Ivan
.
Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems
., 2022.
Porebski, Jakub
.
Occupancy grid environmental modeling for automotive applications
In
Automatics, Computer Science and Biomedical Engineering Department of Automatic Control and Robotics
. Vol. Doctoral Dissertation. Kraków : AGH University of Science and Technology Faculty of Electrical Engineering, 2022.
Ivančík, Radoslav
.
"
Specific Education of Students of The Academy of Police Force in the Field of Security Management
." In
Medzinárodná vedecká konferencia „Nové trendy profesijnej prípravy v Ozbrojených silách“
. Liptovský Mikuláš, 2022.
Nganga, Allan
,
Joel Scanlan
,
Margareta Lützhöft
, and
Steven Mallam
.
Timely Maritime Cyber Threat Resolution in a Multi-Stakeholder Environment
In
CYBER 2022 : The Seventh International Conference on Cyber-Technologies and Cyber-Systems
., 2022.
Gaurav, Akshat
, and
Brij B. Gupta
.
"
Identificación de transacciones fraudulentas en línea y protección: técnicas de vanguardia
."
ESIC Digital Economy and Innovation Journal
1, no. 3 (2022).
Okomanyi, Abraham Onipe
.
Exploring Risk-Based Approach for Preventing Cyberattacks in the Automotive Industry
. Phoenix, Arizona: Grand Canyon University, 2022.
Pages
« първа
‹ предишна
…
511
512
513
514
515
516
517
518
519
следваща ›
последна »
396958 reads
Last updated:
Monday, 01 December 2014
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance