Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Grycuk, Y.
, and
V. Girman
.
Training of Information Security in Educational Institutions of Ukraine
., 2015.
Standards of Higher Education 1701 “Information Security”
In
Standards of Higher Education 1701
., 2014.
The list of specialties in higher educational institutions of Ukraine on the educational and skill levels of specialist and master levels
., 2014.
List of Public Higher Education Institutions Licensed in the Areas of 1601, 1701 in the Field of Knowledge “Information Security”
., 2014.
Passport of Specialty 05.13.21 “System of Information Security”
., 2014.
Passport of Specialty 21.05 “Information Security of the State”
., 2014.
Androulidakis, Iosif
.
PBX Security and Forensics: A Practical Approach
. Springer, 2013.
Analysis Techniques for System Reliability – Procedure for Failure Modes and Effects Analysis (FMEA)
. Geneva: International Electrotechnical Commission, 1985.
Lutz, Robyn R.
,
Guy G. Helmer
,
Michelle M. Moseman
,
David E. Statezni
, and
Stephen R. Tockey
.
Safety Analysis of Requirements for a Product Family
In
3rd International Conference on Requirements Engineering (ICRE '98)
., 1998.
Komari, Iraj Elyasi
,
Vyacheslav Kharchenko
,
Eugene Babeshko
,
Anatoliy Gorbenko
, and
Alexander Siora
.
"
Extended Dependability Analysis of Information and Control Systems by FME(C)A-technique: Models, Procedures, Application
." In
Fourth International Conference on Dependability of Computer Systems, 2009, DepCos-RELCOMEX'09
., 2009.
Gorbenko, Anatoliy
,
Vyacheslav Kharchenko
,
Olga Tarasyuk
, and
Alexey Furmanov
.
"
F(I)MEA-technique of Web Services Analysis and Dependability Ensuring
." In
Rigorous Development of Complex Fault-Tolerant Systems, Lecture Notes in Computer Science
, 153-167. Vol. 4157., 2006.
Avizienis, Algirdas
,
Jean-Claude Laprie
,
Brian Randell
, and
Carl Landwehr
.
"
Basic Concepts and Taxonomy of Dependable and Secure Computing
."
IEEE Transactions on Dependable and Secure Computing
1, no. 1 (2004): 11-33.
Babeshko, Eugene
,
Vyacheslav Kharchenko
, and
Anatoliy Gorbenko
.
"
Applying F(I)MEA-technique for SCADA-based Industrial Control Systems Dependability Assessment and Ensuring
." In
Third International Conference on Dependability of Computer Systems, DepCos-RELCOMEX'08
., 2008.
Kharchenko, Vyacheslav
,
Anton Andrashov
,
Vladimir Sklyar
,
Andriy Kovalenko
, and
Olexandr Siora
.
"
Gap-and-IMECA-based Assessment of I&C Systems Cyber Security
." In
Advances in Intelligent and Soft Computing
, 149-164. Berlin Heidelberg: Springer, 2012.
Androulidakis, Iosif
.
Detecting Cybercrime in Modern Telecommunication Systems
In
Seminar 64/2010, Cyber Crime & High Tech
. Athens: European Police College (CEPOL), 2010.
Androulidakis, Iosif
.
Cybercrime in Fixed Telephony Systems
In
Seminar 62/2011, High Tech & Cyber Crime
. Brdo near Kranj, Slovenia: European Police College (CEPOL), 2011.
Pollard, Craig
.
"
Telecom Fraud: The Cost of Doing Nothing Just Went Up
."
Network Security
2005, no. 2 (2005): 17-19.
Luiijf, Eric
, and
Marieke Klaver
.
Insufficient Situational Awareness about Critical Infrastructures by Emergency Management
In
C3I for Crisis, Emergency and Consequence Management, paper # 10
. Paris: RTO, 2009.
SEREIN TEMPUS project website
., 2016.
Illiashenko, Oleg
,
Vyacheslav Kharchenko
, and
Myhailo Ahtyamov
.
Security Assessment and Green Issues of FPGA-Based Information and Control Systems
In
Proceedings of the IEEE Conference Digital Technologies DT2013
. Žilina, Slovakia, 2013.
Singer, P. W.
, and
Allan Friedman
.
Cybersecurity and Cyberwar: What Everyone Needs to Know
. Oxford: Oxford University Press, 2014.
Holubenko, O.L.
,
O.S. Petrov
, and
V.O. Horoshko
.
"
Features of Training for Specialists in Information Security
."
Information Security
(2009): 5-17.
Hrytsyuk, Y.I.
, and
T.E. Rak
.
"
The Training Problem of Information Security Specialists for the Ministry of Emergencies of Ukraine
." In
Intelligent Decision-making Systems and Problems of Computational Intelligence
, 272-276. Yevpatoria: Kherson, 2011.
Website of the national Tempus/Erasmus+ office in Ukraine
., 2016.
Tarasyuk, O.M.
, and
A.V. Gorbenko
.
"
For Methods for Development of Critical Software
." In
Lecture Materials
. Kharkiv: National Aerospace University Institute “KhAI”, 2009.
Pages
« първа
‹ предишна
…
208
209
210
211
212
213
214
215
216
…
следваща ›
последна »
469822 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all