Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Anderson, Benjamin R.
,
Amy K. Joines
, and
Thomas E. Daniels
.
Xen Worlds: Leveraging Virtualization in Distance Education
. ITiCSE'09, 2009.
Border, Charles
.
The Development and Deployment of a Multi-User, Remote Access Virtualisation System for Networking, Security, and System Administration Classes
. SIGCSE, 2007.
Powell, Valerie J. H.
,
Christopher T. Davis
,
Randall S. Johnson
,
Peter Y. Wu
,
John C. Turchek
, and
Ian W. Parker
.
VLabNet: The Integrated Design of Hands-on Learning in Information Security and Networking
. InfoSecCD, 2007.
Armitage, William D.
,
Alessio Gaspar
, and
Matthew Rideout
.
A UML and MLN Based Approach to Implementing a Networking Laboratory on a Scalable Linux Cluster
. CCSC'07, 2007.
Kneale, Bruce
,
Ain Y. De Horta
, and
Hona Box
.
VELNET (Virtual Environment for Learning Networking)
. ACE2004, 2004.
Krishna, Kumar
,
Weiqing Sun
,
Pratik Rana
,
Tianning Li
, and
R Sekar
.
V-NetLab: Cost-Effective Platform to Support Course Projects in Computer Society
. CISSE, 2008.
Galan, Fermin
,
David Fernandez
,
Walter Fuertes
,
Miguel Gomez
, and
Jorge E. Lopez de Vergara
.
Scenario-based Virtual Network Infrastructure Management in Research and Educational Testbeds with VNUML
. TELECOM, 2009.
Open Cyber Challenge Platform
., 2015.
OWASP Security Shepherd
., 2015.
About Cyber Security Challenge UK
. CESG, 2015.
Cyber Security Challenge UK
., 2014.
The UCSB iCTF Competition
. UCSB, 2015.
Vigna, Giovanni
,
Kevin Borgolte
,
Jacopo Corbetta
,
Adam Doupe
,
Yanick Fratantonio
,
Luca Invernizzi
,
Dhilung Kirat
, and
Yan Shoshitaishvili
.
The Years of iCTF: The Good, The Bad, and The Ugly
. 3GSE, 2014.
Air Force Association
.
CyberPatriot
., 2013.
Fuertes, W
,
J E. Lopez de Vergara
, and
F Meneses
.
Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Use Cases
. ACE II, 2006.
Hronologija Reforme Sektora Bezbednosti u Republici Srbiji 2000–2008
. Beograd: Centar za civilno-vojne odnose, 2009.
Alutaibi, Khaled Shuraem
.
Critical Infrastructure Protection in Saudi Arabia: A Case Study on Petrochemical Industry Protection Against Terrorist Attacks at Jubail Industrial City
. Dhahran, Saudi Arabia: King Fahd University of Petroleum & Minerals, 2009.
Hadji-Janev, Metodi
.
"
Threats to the Critical Infrastructure in South-East Europe posed by Al Qaeda and its Associated Movements: the case of Macedonia
." In
Counterterrorism challenges regarding the Critical Infrastructure protection
. Center for Civil - Military Relation, Monterey, USA, Ljubljana, Slovenia , 2011.
Stecher, Tina
.
Pathways to Regional Resilience
In
The Governance of Adaptation
., 2012.
.
Захист критичної інфраструктури:Проблеми та перспективи впровадження в Україні
. Київ:: НІСД, 2012.
Redden, Shari Lynn
.
The Effectiveness of Combining Simulation and Role Playing in Nursing Education
. Walden University, 2015.
Стойков, Стойко
.
Стратегически мениджмънт на знанието в системата за сигурност и отбрана
. София: Институт Общество на знанието, 2012.
Цветков, Георги Младе
.
Формиране на отбранителната политика на Република България (1990-2010)
. София: ВА "Г.С. Раковски", , 2014.
Petriashvili, Maka
.
Defense institution building: the dynamics of change in Georgia and the need for continuity of effort
. Thesis : Monterey, California: Naval Postgraduate School, 2014.
Badrak, Valentin
.
Building Integrity in Defence Establishments: A Ukrainian Case Study
. Kyiv: Centre for Army, Conversion and Disarmament Studies, 2012.
Pages
« първа
‹ предишна
…
160
161
162
163
164
165
166
167
168
…
следваща ›
последна »
469717 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all