Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Badrignans, Benoit
,
Jean-Luc Danger
,
Viktor Fischer
,
Guy Gogniat
, and
Lionel Torres
.
Security Trends for FPGAs: From Secured to Secure Reconfigurable Systems
. Springer, 2011.
Tehranipoor, Mohammad
, and
Cliff Wang
.
Introduction to Hardware Security and Trust
. New York, NY: Springer, 2012.
TEMPUS GreenCo project web-site
., 2015.
Kharchenko, Vyacheslav
,
Oleg Illiashenko
,
Chris Phillips
, and
Jüri Vain
.
Green Computing within the Context of Educational and Research Projects
In
Recent Advances in Computer Science, Proceedings of the 19th International Conference on Computers (part of CSCC'15)
. Zakynthos Island, Greece, 2015.
TEMPUS CABRIOLET project web-site
., 2015.
Kharchenko, Vyacheslav
, and
Yuriy P. Kondratenko
.
"
Analysis of Peculiarities of Innovative Collaboration between Academic Institutions and IT Companies in Areas S2B and B2S
."
Technical News − in Ukrainian
39-40 (2014): 15-19.
Kondratenko, Yuriy P.
.
"
Revolution in Computer Science and Engineering and Its Impact on Evolution of Higher Education
." In
Revolución, Evolución e Involución en el Futuro de los Sistemas Sociales
, 129-159. Barcelona: Real Academia de Ciencias Económicas y Financieras, 2014.
Kharchenko, Vyacheslav
,
Oleg Illiashenko
,
Artem Boyarchuk
,
Chris Phillips
,
Jüri Vain
, and
Madli Krispin
.
"
FPGA-based Critical Computing: TEMPUS and FP7 Projects Issues
." In
Proceedings of the 10th European Workshop on Microelectronics Education
, 74-79., 2014.
Skarga-Bandurova, Inna
,
Alexandr Ryazantsev
, and
Katerina Kiryushatova
.
"
An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures
."
Information & Security: An International Journal
35, no. 2 (2016): 123-132.
Androulidakis, Iosif
,
Vyacheslav Kharchenko
, and
Andriy Kovalenko
.
"
Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training
."
Information & Security: An International Journal
35, no. 1 (2016): 99-120.
Management of Information Security and Risk. Programme Specification
. City University London, 2015.
Cyber Security. Content and Structure
. City University London, 2015.
Macaulay, Tyson
.
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
. Boston, MA: Auerbach Publications, 2011.
Landoll, Douglas
.
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments
. 2nd ed. Boca Raton, FL: CRC Press, Taylor & Francis Group LLC, 2011.
Peltier, Thomas R.
.
Information Security Risk Analysis
. 3rd ed. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2010.
The IAONA Handbook for Network Security. Industrial Automation Open Networking Alliance
In
Version 1.5
. Magdeburg, Germany, 2006.
9. Noyes, Daniel
.
"
Cyber Security Testing and Training Programs for Industrial Control Systems
." In
The 18th Pacific Basin Nuclear Conference (PBNC 2012), BEXCO
. Busan, Korea, 2012.
MulVAL: A Logic-based, Data-driven Enterprise Security Analyzer
. Argus Cybersecurity Lab at Kansas State University, 2015.
Bayesian network and simulation software for risk analysis and decision support AgenaRisk
., 2015.
About Enterprise Architecture Analysis Tool
. KTH Royal Institute of Technology, 2015.
The Cyber Security Modeling Language
. KTH Royal Institute of Technology, 2015.
Brustoloni, Jose Carlos
.
"
Laboratory Experiments for Network Security Instruction
."
Journal on Educational Resources in Computing
6, no. 4 (2006).
The ENCS Red Team Blue Team Training for Industrial Control Systems and Smart Grid Cyber Security
. 16. European Network for Cyber Security, 2015.
Pomorova, Oksana
, and
Sergii Lysenko
.
"
Formal and Intelligent Methods for Security and Resilience: Education and Training Issues
."
Information & Security: An International Journal
35, no. 2 (2016): 133-150.
On the basic principles to ensure cyber security of Ukraine
In
Law of Ukraine, Draft. Accessed
., 2014.
Pages
« първа
‹ предишна
…
207
208
209
210
211
212
213
214
215
…
следваща ›
последна »
469818 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all