Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Alharbi, Nawaf
,
Maria Papadaki
, and
Paul Dowland
.
"
Security challenges of E-government adoption based on end users' perspective
." In
The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)
., 2014.
Nesterenko, Mykola
.
Implementation of E-Government services Analysis of factors in case of Ukraine
. Vol. Master. Linnaeus University, 2014.
Ihmouda, Rabia
,
Najwa Hayaati Mo Alwi
, and
Ismail Abdullah
.
"
A Systematic Review on E-government Security Aspects
."
International Journal of Enhanced Research in Management & Computer Applications
3, no. 6 (2014): 60-67.
Masrom, Maslin
,
Edith AiLing Lim
, and
Sabariyah Din
.
"
Security and Quality Issues in Trusting E-Government Service Delivery
." In
Managing Trust in Cyberspace
., 2013.
Prima, Edit
,
Rudi Lumanto
, and
Zainal A. Hasibuan
.
"
Evaluation of Government Public Key Infrastructure Implementation based on eGovAMAN Framework
." In
4th International Symposium on Chaos Revolution in Science, Technology and Society
. Chaosware, 2013.
Ibrahim, Mahmood Khalel
, and
Mohammed A. Jabbar Hamid
.
"
Secure E-Government Framework: Design and Implementation
."
International Journal of Computer Science Engineering and Technology (IJCSET)
3, no. 5 (2013): 186-193.
Mirković, Bogdan
.
"
Razvojni okvir međuorganizacionog informacionog sistema za upravljanje fondom divljači
."
INFOTEH-JAHORINA
12 (2013).
Iskender, Gökhan
.
"
e-Government Transformation Success: An Assessment Methodology and the Preliminary Results
."
Transforming Government People Process and Policy
7, no. 3 (2013).
Rana, Nripendra P.
,
Yogesh K. Dwivedi
, and
Michael D. Williams
.
"
Analysing challenges, barriers and CSF of egov adoption
."
Transforming Government People Process and Policy
7, no. 2 (2013).
Rana, Nripendra P.
,
Yogesh K. Dwivedi
, and
Michael D. Williams
.
"
E-Government Adoption Research: Analysing challenges and Critical Success Factors
." In
European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS2012)
. Munich, Germany, 2012.
Bui, Khac-Hoai Nam
, and
Jason J. Jung
.
"
Internet of agents framework for connected vehicles: A case study on distributed traffic control system
."
Journal of Parallel and Distributed Computing
116 (2018): 89-95.
Kang, Chang Mook
,
Soo Jung Jeon
,
Seung-Hi Lee
, and
Chung Choo Chung
.
"
Parametric trajectory prediction of surrounding vehicles
." In
2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES)
. Vienna, Austria , 2017.
G. Kumar, Saroj
,
Ratna Ghosh
,
Debasish Ghose
, and
A. Vengadarajan
.
"
Guidance of Seekerless Interceptors Using Innovation Covariance Based Tuning of Kalman Filters
."
Journal of Guidance, Control, and Dynamics
40, no. 3 (2017): 603-614.
Mao, Zhengyang
, and
Zhanxia Zhu
.
Modular Fuzzy Interacting Multiple Model for Maneuvering Target Tracking
., 2017.
Daniel, Milan
.
"
A Comparison of the Generalized minC Combination and the Hybrid DSm Combination Rules
." In
Advances and Applications of DSmT for Information Fusion (Collected works)
. Vol. II. American Research Press, Rehoboth, 2006.
Daniel, Milan
.
"
Analysis of DSm belief conditioning rules and extension of their applicability
." In
Advances and Applications of DSmT for Information Fusion (Collected works)
. Vol. III. Infinite Study, 2009.
Israel, Steven A.
, and
Erik Blasch
.
"
Context Assumptions for Threat Assessment Systems
." In
Context-Enhanced Information Fusion. Advances in Computer Vision and Pattern Recognition
. Cham: Springer, 2016.
Blasch, Erik
,
Youakim Badr
,
Salim Hariri
, and
Youssif Al-Nashif
.
"
Fusion Trust Service Assessment for Crisis Management Environments
." In
Fusion Methodologies in Crisis Management
. Cham: Springer, 2016.
Blasch, Erik
,
Jean Dezert
, and
B. Pannetier
.
Overview of Dempster-Shafer and belief function tracking methods
In
Signal Processing, Sensor Fusion, and Target Recognition XXI
., 2013.
El-Latif, Ahmed A. Abd
,
Shamim M. Hossain
, and
Ning Wang
.
"
Score level multibiometrics fusion approach for healthcare
."
Cluster Computing
(2017): 1-12 .
Tchamova, Albena
,
Jean Dezert
, and
Florentin Smarandache
.
"
Object identification using T-conorm/norm fusion rule
." In
Advances and Applications of DSmT for Information Fusion (Collected works)
. Vol. III. American Research Press, Rehoboth, 2009.
Tchamova, Albena
,
Jean Dezert
, and
Florentin Smarandache
.
"
New Fusion Rules for Solving Blackman’s Association Problem
." In
Advances and Applications of DSmT for Information Fusion (Collected works)
. Vol. III. American Research Press, Rehoboth, 2009.
Tchamova, Albena
, and
Jean Dezert
.
"
Tracking applications with fuzzy-based fusion rules
." In
2013 IEEE INISTA
. Albena, Bulgaria, 2013.
Henry, Willis
, and
Russell Lundberg
.
"
Integrating Stakeholder Values into Strategic Planning through Comparative RiskAnalysis
." In
Improving Homeland Security Decisions
. Cambridge University Press, 2017.
Dehmer, Matthias
,
Silja Meyer-Nieberg
,
Goran Mihelcic
,
Stefan Pickl
, and
Martin Zsifkovits
.
"
Collaborative risk management for national security and strategic foresight
."
EURO Journal on Decision Processes
3, no. 3–4 (2015): 305-337.
Pages
« първа
‹ предишна
…
303
304
305
306
307
308
309
310
311
…
следваща ›
последна »
470322 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all