Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Lawford, Mark
, and
Alan Wassyng
.
"
Formal Verification of Nuclear Systems: Past, Present, and Future
."
Information & Security: An International Journal
28, no. 2 (2012): 223-235.
Kharchenko, Vyacheslav
, and
Eugene Brezhnev
.
"
Formalizing Power Grid Influence to Assess the Safety of Nuclear Power Plants
."
Information & Security: An International Journal
28, no. 1 (2012): 65-78.
Tverdokhlebov, Vladimir
.
"
Identifying the Reasons for Failures in Large-Scale Systems
."
Information & Security: An International Journal
28, no. 2 (2012): 236-247.
Gorbenko, Anatoliy
,
Vyacheslav Kharchenko
,
Olga Tarasyuk
, and
Alexander Romanovsky
.
"
Intrusion-Avoidance via System Diversity
."
Information & Security: An International Journal
28, no. 1 (2012): 154-158.
Ivanchenko, Oleg
,
Vyacheslav Kharchenko
, and
Aleksandr Skatkov
.
"
Management of Critical Infrastructures Based on Technical Megastate
."
Information & Security: An International Journal
28, no. 1 (2012): 37-51.
Potij, Alexandr
,
Dmitrij Komin
, and
Inna Rebriy
.
"
A Method of Evaluating Assurance Requirements
."
Information & Security: An International Journal
28, no. 1 (2012): 108-120.
Kharybin, Aleksandr
, and
Viktoriya Pohyl
.
"
Methods of Assuring the Functional Safety of Aircraft On-Board Instrumentation&Control Systems in Their Life Cycle
."
Information & Security: An International Journal
28, no. 2 (2012): 296-312.
Netkachova, Kateryna
.
"
Model and Implementation of Safety Case Cores
."
Information & Security: An International Journal
28, no. 2 (2012): 286-295.
Kharchenko, Vyacheslav
,
Oleg Odarushchenko
, and
Valentina Odarushchenko
.
"
Multi-Fragmental Availability Models of Critical Infrastructures with Variable Parameters of System Dependability
."
Information & Security: An International Journal
28, no. 2 (2012): 248-265.
Biryukov, Andriy
,
Oleksandr Gordieiev
, and
Oleksandr Yakimenko
.
"
On the Necessity to Create a National Processing Centre
."
Information & Security: An International Journal
28, no. 2 (2012): 266-272.
Procházková, Dana
.
"
Overview of Fine Exact Methods of Safety Engineering
."
Information & Security: An International Journal
28, no. 2 (2012): 167-178.
Androulidakis, Iosif
.
"
PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure
."
Information & Security: An International Journal
28, no. 1 (2012): 89-97.
Procházková, Dana
.
"
Principles of Mitigating and Managing Human System Risks
."
Information & Security: An International Journal
28, no. 1 (2012): 21-36.
Lysenko, Sergiy
, and
Oleg Savenko
.
"
Software for Computer Systems Trojans Detection as a Safety-Case Tool
."
Information & Security: An International Journal
28, no. 1 (2012): 121-132.
Melenets, Andrey
.
"
The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects
."
Information & Security: An International Journal
28, no. 1 (2012): 52-62.
Gorbenko, Anatoliy
,
Vyacheslav Kharchenko
,
Olga Tarasyuk
, and
Sergiy Zasukha
.
"
A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009
."
Information & Security: An International Journal
28, no. 2 (2012): 179-198.
Kharchenko, Vyacheslav
,
Artem Boyarchuk
, and
Chris Phillips
.
"
TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking
."
Information & Security: An International Journal
28, no. 2 (2012): 315-318.
Volkoviy, Andriy
, and
Ilya Tikhov
.
"
Use of Mobile Applications in Security and Safety Systems
."
Information & Security: An International Journal
28, no. 1 (2012): 146-153.
Tagarev, Todor
.
Civilian Control in Defence (in Russian)
., 2012.
Milina, Velichka
.
New Trends in the Policies for Security of Critical Energy Infrastructures
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2013.
Georgiev, Venelin
.
Strategy Maps and Balanced Scorecard - used for Assessing the Activities of the Entities in the BAS
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2013.
Monitor, ISIJ
.
"
Acronyms
."
Information & Security: An International Journal
29, no. 2 (2013): 185-188.
Tagarev, Todor
, and
Petya Ivanova
.
"
Analytical support to foresighting EU roles as a Global Security Actor
."
Information & Security: An International Journal
29, no. 1 (2013): 21-33.
Nerlich, Uwe
.
"
Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider?
"
Information & Security: An International Journal
29, no. 1 (2013): 77-87.
López, David
, and
Oscar Pastor
.
"
Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains
."
Information & Security: An International Journal
29, no. 1 (2013): 69-76.
Pages
« първа
‹ предишна
…
26
27
28
29
30
31
32
33
34
…
следваща ›
последна »
469360 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all