Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Pfister, Cuno
.
Getting started with the Internet of Things
. Sebastopol, CA: O’Reilly Media, 2011.
da Costa, Francis
, and
Byron Henderson
.
Rethinking the Internet of Things - A Scalable Approach to Connecting Everything
. New York: Apress, 2014.
Gonzalez, Marcelo Hector
, and
Jana Djurica
.
"
Internet of Things Offers Great Opportunities and Much Risk
."
ISACA Journal
2 (2015).
Monte, Matthew
.
Network Attacks and Exploitation: A Framework
. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2015.
Dhanjani, Nitesh
.
Abusing the Internet of Things - Blackouts, Freakouts and Stakeouts
. Sebastopol, CA: O’Reilly, 2015.
Hersent, Olivier
,
David Boswarthick
, and
Omar Elloumi
.
The Internet of Things - Key Applications and Protocols
. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2012.
Jing, Qi
,
Athanasios V. Vasilakos
,
Jiafu Wan
,
Jingwei Lu
, and
Dechao Qiu
.
"
Security of the Internet of Things: perspectives and challenges
."
Wireless Networks
20, no. 8 (2014): 2481-2501.
Martin, Robert
.
"
The Internet of Things (IoT) –Removing the Human Element
."
Infosec Writers
(2015).
Bachmann, Sascha-Dominik
, and
Hakan Gunneriusson
.
"
Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Peace and Security
."
The Journal of Terorism and Security Analysis
(2014): 26-36.
"
The National Security Concept of the Republic of Bulgaria
."
National Security Priorities and Factors
(1998): 5.
The National Security Strategy of the Republic of Bulgaria (Sector Security Policies. Financial and Economic Security Policies)
. Approved by the National Assembly Decision of 25 February 2011, State Gazette, no. 1 ed., 2011.
Feaster, Seth W.
,
Nelson D. Schwartz
, and
Tom Kuntz
.
"
It's All Connected: A Spectators Guide to the Euro Crisis
."
New York Times
(2011).
Slatinski, Nickolay
.
On Five Levels of Security
. Sofia: Military publishing house, 2010.
Dobbs, Richard
,
Jonathan Woetzel
,
Susan Lund
, and
Mina Mutafchieva
.
Debt and (not much) deleveraging
. McKinsey Global Institute, 2015.
Yordanova, Gergana
.
Sovereign Debt Modeling Within the Context of the National Security Policy of the Republic of Bulgaria
. Vol. Dissertation. Sofia: Central Research and Technical Library, 2016.
Deriglazova, Larisa
.
"
Asymmetric character of contemporary conflicts
."
Geopolitics Magazine
(2010).
Christie, Paul
.
Ukraine`s fate no one cares
In
Economic Bulletin
. Bremen, Lower Saxony, Germany: Professional Public Conversation by the European, 2014.
Stanev, Zhivko
.
"
Paradigm of Geo-economics: Global Moving Power in XXI century
."
Geopolitics Magazine
3 (2006).
Cielen, Davy
,
Arno D. B. Meysman
, and
Mohamed Ali
.
Introducing Data Science: Big Data, Machine Learning, and More, Using Python Tools
. Shelter Island, NY: Manning, 2016.
Lescovec, Jure
,
Anand Rajaraman
, and
Jeffrey D. Ullman
.
Mining of Massive Datasets
. Second ed. Cambridge: Cambridge University Press, 2014.
McIlwraith, Douglas G.
,
Haralambos Marmanis
, and
Dmitry Babenko
.
Algorithms of the Intelligent Web
. Second ed. Shelter Island, NY: Manning, 2016.
Russell, Stuart
, and
Peter Norvig
.
Artificial Intelligence: A Modern Approach
. Third edition. Harlow, Essex, UK: Pearson Education, 2014.
Cederberg, Aapo
, and
Pasi Eronen
.
"
How Can Societies Be Defended Against Hybrid Threats?
"
Strategic Security Analysis
9 (2015).
Fleming, Brian P.
.
The Hybrid Threat Concept: Contemporary War, Military Planning and the Advent of Unrestricted Operational Art
In
School of Advanced Military Studies
. Fort Leavenworth, Kansas: United States Army Command and General Staff College, 2011.
Stoykov, Mitko
.
"
DARI Report on the Results of National Expert Assessment of Institutional Capabilities to Countering Hybrid Threats
." In
International conference “Interagency and International Cooperation in Countering Hybrid Threats"
. Sofia, Bulgaria, 2016.
Pages
« първа
‹ предишна
…
278
279
280
281
282
283
284
285
286
…
следваща ›
последна »
470121 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all