Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
The Threat Landscape
. Kaspersky, 2013.
Kamau, Macharia
.
Kenya Wants EAC States to Hasten Fake Phone Switch Off
. Standard Digital, 2013.
Kigwe, Winfred
.
Kenya: 1.9 million Fake Phones Shut
. All Africa, 2012.
van Niekerk, Brett
, and
Manoj Maharaj
.
Mobile Security from an Information Warfare Perspective
. Information Security for South Africa (ISSA), 2010.
Seriot, Nicolas
.
iPhone Privacy
. Black Hat DC, 2010.
Renaud, Karen
, and
Wendy Goucher
.
"
Monkey See – Money Take Photo: The Risk of Mobile Information Leakage
."
International Journal of Cyber Warfare and Terrorism 3, no. 4
3, no. 4 (2013).
Morrow, Bill
.
"
BYOD Security challenges: control and protect your most sensitive data
."
Network Security
12 (2012): 5-8.
Okeowo, Alexis
.
"
SMSs used as a tool of hate in Kenya
."
The Mail and Guardian
(2008).
Howard, Philip
, and
Muzammil Hussain
.
Democracy Fourth Wave? Digital Media and the Arab Spring
. Oxford: Oxford University Press, 2013.
KICTANet 28-29 September 2007 Workshop Report
. KICTANet, 2007.
Impact of mobile Internet on people in Kenya, Nigeria and South Africa
. Device Research, 2014.
Internet Usage Statistics for Africa
In
World Internet Statistics
., 2014.
The South African Cyber Threat Barometer
. WolfPack, 2013.
Kenya Cyber Security Repor 2012
., 2012.
Cellphone Safety website
., 2015.
Local Resources on Cybercrime
In
Cybercrime
., 2015.
Grobler, Martie
,
Joey Jansen Van Vuuren
, and
Louise Leenen
.
"
Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward
."
Council for Scientific and Industrial Research
(2012).
Magutu, Peterson Obara
,
Gladys Monchari Ondimu
, and
Christopher Jilo Ipu
.
"
Effects of Cybercrime on State Security: Types, Impact and Mitigations with Fibre Optic Deployment in Kenya
."
Journal of Information Assurance & Cybersecurity
(2011).
Geer, Dan
.
"
Cybersecurity as Realpolitik
." In
Black Hat USA 2014 Conference
., 2014.
Herley, Cormac
,
P.C. van Oorschot
, and
Andrew Patrick
.
"
Passwords: If We’re So Smart, Why Are We Still Using Them?
" In
Financial Cryptography and Data Security
, 230-237. Berlin/Heidelberg: Springer, 2009.
Schneier, Bruce
.
Carry On: Sound Advice from Schneier on Security
. Indianapolis, IN: John Wiley, 2004.
Phahlamohlaka, Jackie
,
Joey Jansen Van Vuuren
, and
A. C. Coetzee
.
Cyber Security Awareness Toolkit for National Security: An Approach to South Africa’s Cyber Security Policy Implementation
., 2011.
Christin, Nicholas
,
Serge Egelman
,
Timothy Vidas
, and
Jens Grossklags
.
"
It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice
." In
Financial Cryptography and Data Security
, 16-30. Berlin/Heidelberg: Springer, 2012.
"
Social Engineering: People Hacking
." In
Control Essentials
. Enterprise Risk Management, 2009.
On Approval of the Conceptual Design of Information Society in the Republic of Moldova and the Mechanism for Its Implementation
In
Government Decision of the Republic of Moldova
., 1995.
Pages
« първа
‹ предишна
…
109
110
111
112
113
114
115
116
117
…
следваща ›
последна »
469599 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all