Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Ponder, Sarah
, and
Jonathan Matusit
.
"
Examining ISIS Online Recruitment through Relational Development Theory
."
Connections: The Quarterly Journal
16, no. 4 (2017): 35-50.
Nasirov, Elman
, and
Khayal Iskandarov
.
"
The Prospects of Azerbaijan to Enhance Military Interoperability with NATO
."
Connections: The Quarterly Journal
16, no. 4 (2017): 89-99.
Kaura, Vinay
.
"
India’s Counter-Terrorism Policy against Jihadist Terror: Challenges and Prospects
."
Connections: The Quarterly Journal
16, no. 4 (2017): 51-67.
Nicolson, Dasha
.
"
Foreign Terrorist Fighters from the North Caucasus: Understanding Islamic State Influence in the Region
."
Connections: The Quarterly Journal
16, no. 4 (2017): 69-88.
Chincholkar, Y. D.
, and
Ayush Kumar
.
"
Traffic Sign Board Detection for Advanced Driver Assistance Systems and Autonomous Vehicles
."
Automation and Autonomous System
10, no. 6 (2018).
Chincholkar, Y. D.
, and
Ayush Kumar
.
"
Traffic Sign Board Detection for Advanced Driver Assistance Systems and Autonomous Vehicles
."
Automation and Autonomous System
10, no. 6 (2018).
Selvi, P.Pandi
, and
T.Meyyappan
.
"
A New Approach for the Recognition of Characters from Vehicle Number Plate Images using K Nearest Neighbor Classifier and Enhanced Artificial Neural Network
."
International Journal of Pure and Applied Mathematics
118, no. 7 (2018).
Shires, James
.
"
Enacting Expertise: Ritual and Risk in Cybersecurity
."
Politics and Governance
6, no. 2 (2018): 31-40.
Bossong, Raphael
.
"
Critical Infrastructure and Critical Information Infrastructure Protection: The Hew Frontier of EU Internal Security
." In
Challenges and Critiques of the EU Internal Security Strategy: Rights, Power and Security
. Cambridge, 2017.
Tag Archives: technology
. ATW Learn, Wordpress.com, 2012.
Kovačević, Božo
.
"
Cyberwar – Američka Izlika za Novi Hladni Rat?
"
Polemos
16, no. 2 (2013): 91-110.
Bossong, Raphael
.
"
The European Programme for the protection of critical infrastructures–meta-governing a new security problem?
"
European Security
23, no. 2 (2014).
Read, Oliver
.
"
How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage
." In
Cyberspace and International Relations
, 203-230 . Berlin, Heidelberg : Springer, 2014.
Soyer, Hubert
.
"
Internet Science Risk, Risk Perception, and Cyberwar
."
Network Architectures and Services
(2013).
Lawson, Sean
.
"
Putting the “war” in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States
."
First Monday
17, no. 7 (2012): 49-73.
Satija, Siddhant
, and
Prabhakar Shukla
.
"
Consumer Behaviour and Adoption of M-Commerce
."
AGU International Journal of Management Studies & Research
6 (2018).
Fariborzi, Elham
, and
Hoda Anvari Kazemabad
.
"
The Security of Information in Financial Transactions via Mobile: Algorithms
."
International Journal of Computer Networks and Communications Security
1, no. 6 (2013): 257-263.
de Amorim, Wellyngton Silva
,
Isabela Blasi Valduga
,
João Marcelo Pe Ribeiro
,
Victoria Guazzelli Williamson
,
Grace Ellen Krauser
,
Mica Katrina Magtoto
, and
José Baltazar S. Guerra
.
"
The nexus between water, energy, and food in the context of the global risks: An analysis of the interactions between food, water, and energy security
."
Environmental Impact Assessment Review
72 (2018): 1-11.
Rogito, Pauline Kemunto
.
Multi-Tiered Security Architecture for Information Infrastructure Protection in Selected Commercial Banks in Kenya
In
School of Science and Technology
. Vol. Master of Science in Information Systems and Technology. Africa: United States International University, 2017.
Setiawan, Ahmad Budi
.
"
Peningkatan Keamanan Supervisory Control and Data Acquisition (Scada) Pada Smart Grid Sebagai Infrastruktur Kritis
."
Jurnal Penelitian Pos & Informatika
6, no. 1 (2016).
Setiawan, Ahmad Budi
.
"
Kajian Strategi Pengamanan Infrastruktur Sumber Daya Informasi Kritis
."
Buletin Pos dan Telekomunikasi
13, no. 1 (2015): 43-60.
Nagyfejeo, Eva
.
"
Transatlantic collaboration in countering cyberterrorism
." In
Terrorism Online: Politics, Law and Technology
., 2015.
Njotini, MN
.
"
Protecting Critical Databases–Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa
."
Potchefstroom Electronic Law Journal
16, no. 1 (2013).
NATO
.
Operations and Missions: Past and Present
., 2018.
Guiding Principles for Stabilization & Reconstruction
. Washington, D.C.: United States Institute of Peace, United States Army Peacekeeping and Stability Operations Institute, 2009.
Pages
« първа
‹ предишна
…
290
291
292
293
294
295
296
297
298
…
следваща ›
последна »
470301 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all