Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Havas, Attila
.
"
Intelligent benchmarking: how to design and use it for learning in Central and Eastern Europe
." In
Supporting RECORD Centres of Excellence: Conclusions for Policy
, 73-90. Budapest: Budapest University of Technology and Economics, 2004.
Bessant, John
, and
Howard Rush
.
Approaches to Benchmarking: the case of ‘framework conditions’ and ICT-Os
. Brighton, UK: Centre for Research in Innovation Management, University of Brighton, 1999.
Fagerberg, Jan
.
The potential of benchmarking as a tool for policy learning
In
IPTS Report
., 2003.
Dévai, Katalin
,
Eamon Cahill
, and
Norbert Gallagher
.
"
RECORD’s Brighton conference – a summary
." In
A methodology for benchmarking RTDI organisations in CEE
. Brighton-Budapest, 2002.
Argyris, Chris
.
Knowledge for action: A guide to overcoming barriers to organizational change
. San Francisco: Jossey-Bass, 1993.
Senge, Peter
.
The Fifth Discipline – The Art & Practice of a Learning Organization
. New York: Doubleday, 1990.
Childre, Doc Lew
.
Cut-thru: Achieve Total Security and Maximum Energy: A Scientifically Proven Insight on How to Care Without Becoming a Victim
. Boulder Creek, Calif.: Planetary Publications, 1996.
McCarthy, Kathleen
.
"
Uncertainty is a Blessing, Not a Bane
."
APA Monitor
(1994): 28.
Apiecionek, Łukasz
, and
Michał Romantowski
.
"
Secure IP Network Model, Computational Method
."
Science and Technology
19, no. 4 (2013): 209-213.
Information Exchange Gateways: Reference Architecture
In
A Nexor White Paper
. Nexor, 2009.
Extensible Messaging and Presence Protocol (XMPP): Core (RFC 3920)
. Jabber Software Foundation, 2004.
Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence (RFC 3921)
. Jabber Software Foundation, 2004.
Vision 2020: Bulgaria in NATO and the European Defence
. Sofia: Ministry of Defence, 2014.
Nikolov, Rumen
.
Prospects for the Development of the Bulgarian Armed Forces in the Face of Hybrid Threats ( in Bulgarian)
In
Lecture at the “G.S. Rakovski” National Defence Academy, Sofia
., 2015.
Dimov, Petko
.
"
Main Characteristics of the Operations’ Environment and Algorithm of Hybrid War (in Bulgarian)
."
Military Journal
123, no. 1 (2016): 86-96.
Clark, Richard
, and
Robert Nake
.
World War III: what will it be like? High Technologies in the Service of Militarism (in Russian)
. Piter, 2011.
5. Meyers, Adam
.
Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units
. CrowdStrike, 2016.
Cisco CCNA Introduction to Networks course
. Cisco Networking Academy, 2016.
"
Hybrid Warfare: Briefing to the Subcommittee on Terrorism, Unconventional Threats and Capabilities
." Committee on Armed Services, House of Representatives, 2014.
"
EW Aircraft: Survive for a ‘Thick Veil’ of Interference (in Russian)
."
Army News
(2014).
"
Complex EW 'Krasukha - 4' (in Russian)
."
Military Review, News VPK
(2013).
Sushentsov, Andrey
.
"
Russian ‘Hybrid War’: Nothing New (in Russian)
."
Foreign Policy
(2015).
'Mercury' in the Russian army forces (Russian)
. Krasfun.ru, 2014.
The president-C 'averted a missile away from a Russian Mi-8 in Syria (in Russian)
. EurAsia Daily, 2016.
December 2015 Ukraine power grid cyberattack
. Wikipedia, 2015.
Pages
« първа
‹ предишна
…
281
282
283
284
285
286
287
288
289
…
следваща ›
последна »
470112 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all