Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Busuncian, Tatiana
.
"
International Intelligence Cooperation against Terrorist Targets – Phase II
." In
The Dangerous Landscape
, 133-151., 2013.
Sick, Armin
.
"
Understanding Homegrown Terrorism
." In
The Dangerous Landscape
, 153-170., 2013.
Sarkisyan, Sergei
.
"
Aspects of Recruitment by Terrorist Organizations in Europe’s Muslim Communities
." In
The Dangerous Landscape
, 171-189., 2013.
Azinovic, Vlado
.
"
Bosnia and Herzegovina and Terrorism 1996-2011: Defining the Threat, Devising Counterterrorism Strategy
." In
The Dangerous Landscape
, 191-209., 2013.
Schmid, Alex P.
.
"
International Terrorism and International Tourism
." In
The Dangerous Landscape
, 211-219., 2013.
Le Beau, John J.
.
"
The Death of bin Laden, and the Future of Al-Qaeda
." In
The Dangerous Landscape
, 221-222., 2013.
Tichý, Lukáš
, and
Jan Eichler
.
"
Terrorist Attacks on the Energy Sector: The Case of Al Qaeda and the Islamic State
."
Studies in Conflict & Terrorism
(2017).
Tagarev, Todor
.
"
A Generic Reference Curriculum on Cybersecurity
."
Information & Security: An International Journal
35, no. 2 (2016): 181-184.
Sadiku, Matthew N. O.
,
Shumon Alam
, and
Sarhan M. Musa
.
"
Information Assurance Benefits and Challenges: An Introduction
."
Information & Security: An International Journal
36 (2017).
Wilson, Kelce S.
.
"
Conflicts among the Pillars of Information Assurance
."
IT Professional
15, no. 4 (2013): 44-49.
Ezingeard, Jean-Noël
,
Elspeth McFadzean
, and
David Birchall
.
"
A Model of Information Assurance Benefits
."
Information Systems Management
22, no. 2 (2005): 22-29.
Lester, Cynthia Y.
,
Hira Narang
, and
Chung-Han Chen
.
Infusing Information Assurance into an Undergraduate CS Curriculum
In
Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies SECUR¬WARE'08
. Cap Esterel, France, 2008.
Cooper, Stephen
,
Christine Nickell
,
Victor Piotrowski
,
Brenda Oldfield
,
Bill Caelli
, and
Lance Hoffman
.
"
An Exploration of the Current State of Information Assurance Education
."
ACM SIGCSE Bulletin
41, no. 4 (2009): 109-125.
Cannoy, Sherrie Drye
, and
A. F. Salam
.
"
A Framework for Health Care Information Assurance Policy and Compliance
."
Communications of the ACM
53, no. 3 (2010): 126-131.
Deb, Budhaditya
,
Sudeept Bhatnagar
, and
Badri Nath
.
Information Assurance in Sensor Networks
In
2nd ACM International Conference on Wireless Sensor Networks and Applications WSNA’03
. San Diego, CA, 2003.
NATO C4ISR Comprehensive Approach
In
NATO C3 Board and NC3A
. Brussels, 2009.
COBIT 5: A Business Framework for the Governance and Management of Enterprise IT
., 2017.
Persse, James R.
.
Process Improvement Essentials: CMMI, Six Sigma, and ISO 9001
. Sebastopol, CA: O’Reilly Media, 2006.
Doz, Yves L.
, and
Mikko Kosonen
.
Fast Strategy: How Strategic Agility Will Help You Stay Ahead of the Game
. Harlow, England: Wharton School Publishing, 2008.
Collins, Jim
, and
Morten T. Hansen
.
Great by Choice: Uncertainty, Chaos, and Luck – Why Some Thrive Despite Them All
. New York, NY: HarperCollins, 2011.
Hiatt, Jeffrey M.
.
ADKAR: A Model for Change in Business, Government and our Community
. Loveland, CO: Prosci Inc., 2006.
Carroll, John
.
Project Program and Portfolio Management in Easy Steps
. Warwickshire, UK: Easy Steps Limited, 2014.
Brewster, Ernest
,
Richard Griffiths
,
Aidan Lawes
, and
John Sansbury
.
IT Service Management: A Guide for ITIL Foundation Exam Candidates
. Second ed. Swindon, UK: British Informatics Society Limited, 2012.
Razmetaeva, Yulia
.
Hybrid War, Information Technologies and the Legal Vacuum in the Digital World
In
How Deep is Your Law? Brexit. Technologies. Modern Conflicts, 5th International Conference of PhD Students and Young Researchers
. Vilnius, Lithuania: Vilnius University Faculty of Law, 2017.
Herța, Laura-Maria
.
Hybrid Warfare – A Form of Asymmetric Conflict
In
International conference "The Knowledge-Based Organization"
. Vol. 23., 2017.
Pages
« първа
‹ предишна
…
213
214
215
216
217
218
219
220
221
…
следваща ›
последна »
469835 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all