Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
SPSS Tutorials
., 2015.
Structural Equation Modeling, Dell Statistics Textbook
., 2015.
SPSS Amos
. IBM, 2015.
Preacher, Kristopher
.
"
Quantifying Parsimony in Structural Equation Modeling
."
Multivariate Behavioural Research
41, no. 3 (2006).
Quantitative Data Analysis, Structural Equation Modeling
. Psychlopedia, 2015.
Vietti, Francesca
, and
Roberto Franzini Tibaldeo
.
"
A Human Rights and Ethical Lens on Security and Human Dignity: The Case Study of Syrian Asylum Seekers
."
Information & Security: An International Journal
33, no. 1 (2015): 35-53.
Bonfanti, Matteo E.
, and
Francesca Capone
.
"
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
."
Information & Security: An International Journal
33, no. 1 (2015): 55-80.
Todorova, Antonia
.
"
Turkish Security Discourses and Policies: The Kurdish Question
."
Information & Security: An International Journal
33, no. 2 (2015): 108-121.
Nikolic, Nebojsa
.
"
Serbian Security Perceptions: Motivations to Serve
."
Information & Security: An International Journal
33, no. 2 (2015): 122-137.
Prezelj, Iztok
.
"
Comprehensive Security and Some Implemental Limits
."
Information & Security: An International Journal
33, no. 1 (2015): 13-34.
Ratchev, Valeri
,
Vesselin Petkov
, and
Todor Tagarev
.
"
Evolving Security Concepts: The Premium on Governance in the Case of Bulgaria
."
Information & Security: An International Journal
33, no. 2 (2015): 83-107.
Lieberz, Daniela
.
"
Multivariate Statistics of Security Perceptions in Europe
."
Information & Security: An International Journal
33, no. 2 (2015): 138-166.
Sweijs, Tim
, and
Milos Jovanovic
.
"
Assessing Comprehensive Security Approaches in Action: An Introduction
."
Information & Security: An International Journal
33, no. 1 (2015): 5-9.
Brimmer, Esther
.
"
From Territorial Security to Societal Security: Implications for the Transatlantic Strategic Outlook
." In
Transforming Homeland Security: U.S. and European Approaches
. Center for Transatlantic Relations, Paul H. Nitze School of Advanced International Studies, Johns Hopkins University, 2006.
J. Burgess, Peter
.
Handbook of New Security Studies
. Routledge, 2010.
Biscop, Sven
, and
Rik Coolsaet
.
The World Is the Stage: A Global Security Strategy for the EU
In
Groupement d’Etudes et de Recherches “Notre Europe,” Policy Paper
. Vol. 8., 2003.
Deliverable 1.1. Conceptual Foundations of Security
. ETTIS (European Security Trends and Threats in Society), 2012.
The European Agenda on Security
. European Commission, 2015.
The EU’s Comprehensive Approach to External Conflict and Crisis, Joint Communication to the European Parliament and the Council
., 2013.
Drent, Margriet
.
"
The EU’s Comprehensive Approach to Security: A Culture of Co-Ordination?
"
Studia Diplomatica
64, no. 2 (2011): 3-4.
Faria, Fernanda
.
What EU Comprehensive Approach? Challenges for the EU Action Plan and Beyond
., 2014.
Hauck, Volker
, and
Camilla Rocca
.
Gaps between Comprehensive Approaches of the EU and EU Member States
., 2014.
"
Evolving Concept of Security: Project Overview
."
Information & Security: An International Journal
33, no. 2 (2015): 169-172.
"
EvoCS-related Projects and Initiatives
."
Information & Security: An International Journal
33, no. 2 (2015): 173-174.
Wither, James K.
, and
Sam Mullins
.
"
Foreword
." In
Combating Transnational Terrorism
, vii-x. Sofia: Procon Ltd., 2016.
Pages
« първа
‹ предишна
…
137
138
139
140
141
142
143
144
145
…
следваща ›
последна »
469665 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all