Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Ebbers, Mike
.
IBM Lotus Learning Management System. Textbook
. IBM International Technical Support Organization, 2003.
Thompson, Kerry
.
Introducing the Lotus Workplace Collaborative Learning Authoring Tool
. IBM International Technical Support Organizatio, 2004.
Morningstar, Barbara
,
Jeremy Schubert
, and
Kristine Thibeault
.
WebCT: A Major Shift of Emphasis
In
Technical Evolution Report
. Athabasca University, 2004.
Distance Learning System “Prometheus”
In
LLC “Virtual Technologies in Education” - in Russian
., 2016.
Features and Specifications of Distance Education System Moodle
In
LLC “Open Technologies” - in Russian
., 2016.
Govor, O.
.
Research and Development of Hardware and Software to Protect the Serial Communication
. Vol. MR Thesis [manuscript]- in Russian. Dnipropetrovsk, 2011.
Geisler, Martin
,
Mikkel Krøigård
, and
Andreas Danielsen
.
About Random Bits
., 2004.
Shushpan, V.
.
Development of the Remote Laboratory Work on the Course “Applied cryptology”
. Vol. MR Thesis [manuscript]– in Russian. Dnipropetrovsk, 2015.
Paar, Christof
, and
Jan Pelzl
.
"
The Advanced Encryption Standard
." In
Understanding Cryptography, A Textbook for Students and Practitioners
. Springer, 2009.
Teterin, R.
.
Research and Development of Means of Password Authentication of Users of Information Systems
. Vol. MR thesis [manuscript]– in Russian. Dnipropetrovsk, 2015.
Rukhin, A.
.
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
In
NIST Special Publication
., 2010.
Smith, Richard E.
.
Authentication: From Passwords to Public Keys
. Addison-Wesley, 2001.
Strong passwords
. Microsoft Technet Library, 2005.
Lapin, E.
.
Research of a complex of identification of users in information systems
. Vol. MR Thesis [manuscript]- in Russian. Dnipropetrovsk, 2015.
Navozenko, D.
.
Development of a program complex of password protection by the principle “inquiry answer”
. Vol. MR Thesis [manuscript] - in Russian. Dnipropetrovsk, 2015.
Haller, N.
.
The S/KEY One-Time Password System
. Bellcore, 1995.
Harress, Christopher
.
"
Obama says cyberterrorism is country's biggest threat, U.S. Government Assembles ‘Cyber Warriors’
."
International Business Times
(2014).
Paget, François
.
Financial Fraud and Internet Banking: Threats and Countermeasures
In
McAfee report
. Santa Clara: CA: McAfee, 2009.
Wolf, Brett
.
HSBC loses senior anti-money laundering compliance executive
. Reuters, 2015.
The Stuxnet Worm
. Norton by Symantec, 2015.
Langner, Ralph
.
"
Stuxnet’s Secret Twin
."
Foreign Policy
(2013).
TEMPUS SEREIN project web-site
., 2016.
Richards, Jason
.
"
Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security
."
International Affairs Review
(2015).
Yastrebenetsky, Michael
, and
Vyacheslav Kharchenko
.
Nuclear Power Plant Instrumentation and Control Systems for Safety and Security
. Hershey, PA: IGI Global, 2014.
Huffmire, Ted
,
Cynthia Irvine
,
Thuy D. Nguyen
,
Timothy Levin
,
Ryan Kastner
, and
Timothy Sherwood
.
Handbook of FPGA Design Security
. Dordrecht: Springer, 2010.
Pages
« първа
‹ предишна
…
206
207
208
209
210
211
212
213
214
…
следваща ›
последна »
469816 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all