Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Çelik, Turgay
, and
Bedir Tekinerdogan
.
"
S-IDE: A tool framework for optimizing deployment architecture of High Level Architecture based simulation systems
."
Journal of Systems and Software
86, no. 10 (2013): 2520-2541.
De Nicola, Antonio
,
Alberto Tofani
,
Giordano Vicoli
, and
Maria Luisa Villani
.
"
An MDA-based Approach to Crisis and Emergency Management Modeling
."
International Journal on Advances in Intelligent Systems
5, no. 1 & 2 (2012): 89-100.
Ma, C.
,
H.-B. Sun
,
T.-Y. Xiao
, and
W.-H. Fan
.
"
Novel model-driven joining technology for cloud manufacturing federations
."
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS
18, no. 7 (2012): 1536-1546.
Çetinkaya, Deniz
.
A Metamodel for The High Level Architecture Object Model
In
The graduate school of natural and applied sciences
. Vol. Master of science in computer engineering. Middle east technical university, 2005.
Çelik, Turgay
,
Göktuğ F. Gökdoğan
, and
Karahan Öztürk
.
"
An HLA-based tactical environment application framework
."
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology
10, no. 3 (2013): 217-233.
Tingxue, Xu
,
Zhao Jianzhong
,
Yu Renbo
, and
Gu Junyuan
.
"
Design and Implementation of HLA-Based Military and Civilian Integrated Maintenance Support Simulation System for Missile Equipment (基于HLA的导弹装备军民一体化维修保障仿真系统设计与实现)
."
System Engineering Theory and Practice
3 (2013).
Xuefeng, Yan
, and
Fēng Bái Hǎi
.
"
Research and Implementation of Simulation Model Transformation Framework Based on MDA (基于MDA的仿真模型转换框架研究与实现)
."
Journal of System Simulation
9 (2011).
Xiao, Ma Cheng
, and
Tianyuan Fan Yenhui
.
"
Research on two-layer HLA technology based on MDA (基于MDA的两层HLA技术研究)
."
Journal of System Simulation
11 (2010).
Cheng, Ma
,
Sun Hongbo
,
Xiao Tianyuan
,
Fan Wenhui
, and
Li Li
.
"
A model-driven cloud manufacturing federated access technology (一种模型驱动的云制造联邦接入技术)
."
Computer Integrated Manufacturing System
7 (2012).
Al-Hakkak, Nada M.
, and
Nawal A. Ibrahim
.
"
UML-XML for Discrete Event Simulation with Automatic Code Generation Ability
."
Iraq Academic Scientific Journal
25 (2010): 415-430 .
Park, Sanghun
,
Wontae Kim
, and
Insung Ihm
.
"
Mobile collaborative medical display system
."
Computer Methods and Programs in Biomedicine
89, no. 3 (2008): 248-260.
van Tonder, Bradley
, and
Janet Wesson
.
Using adaptive interfaces to improve mobile map-based visualisation
In
SAICSIT '08 Annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology
. Wilderness, South Afric, 2008.
Ehret, J.
,
A. Ebert
,
L. Schuchardt
,
H. Steinmetz
, and
H. Hagen
.
"
Context-Adaptive Mobile Visualization and Information Management
." In
IEEE Visualization 2004
. Austin, TX, USA, USA , 2004.
Pattath, Avin
.
Interactive visualization for mobile visual analytics
In
Engineering, Computer, Computer Science
. Vol. Ph.D. Purdue University, 2010.
van Tonder, Bradley
, and
Janet Wesson
.
Adaptive Interfaces for Mobile Map-based Visualisation
., 2019.
Popa, Mircea
,
Anca Sorana Popa
, and
Horia Ciocarlie
.
Software Interface for Pocket PC Based Mobile Telephony
In
4th WSEAS Int. Conference on Electromagnetics, Wireless and Optical Communications
. Venice, Italy, 2006.
Chang, Ming-Hsin
,
I-Te Chen
, and
Ming-Te Chen
.
"
Design of Proxy Signature in ECDSA
." In
Eighth International Conference on Intelligent Systems Design and Applications
. Kaohsiung, Taiwan , 2008.
Fazlagic, Samir
.
"
Delegating signing capability in workflow systems
." In
2nd International Conference on Computer Engineering and Technology
. Chengdu, China , 2010.
Chang, Ming-Hsin
,
I-Te Chen
, and
Ming-Te Chen
.
"
Enhance ECDSA to Identity-based Proxy Signature Scheme
."
Journal of Information Assurance and Security (JIAS)
5 (2010).
Fazlagic, Samir
,
Narcis Behlilovic
, and
Sasa Mrdovic
.
"
Controlled Delegation of Signature in Workflow Systems
." In
20th Telecommunications Forum (TELFOR)
. Belgrade, Serbia , 2012.
Chen, I-Te
.
Studies on Proxy Signatures with/without Proactive Property
In
Department of Computer Science, College of Computer Science
. Vol. Doctor of Philosophy in Computer Science. HsinChu, Taiwan, Republic of China: National Chiao Tung University, 2005.
Chang, Ming-Hsin
.
On Proxy Signatures with Forward-Secure and One-time Properties and their Applications in PKI
In
Department of Computer Science and Information Engineering, College of Electrical Engineering and Computer Science
. Vol. Doctor of Philosophy in Computer Science and Information Engineering. Hsinchu, Taiwan, Republic of China: National Chiao Tung University, 2005.
Cuoco, Elia
.
"
La Formazione A Distanza Per il Personale delle Forze Armate: Un Programma per il Futuro
."
Informazioni della Difesa
6 (2010).
О.В., Данилова
,
Синица К. М.
, and
Мартынов Д.В.
.
"
Использование компетентностного подхода при создании учебного он-лайн курса ELTEC
."
Образовательные технологии и общество
11, no. 3 (2008).
Подгорнов, А
, and
К Синица
.
"
Object Orchestrator—приложение для создания и поддержки учебного материала
."
Образовательные технологии и общество
8, no. 3 (2005).
Pages
« първа
‹ предишна
…
335
336
337
338
339
340
341
342
343
…
следваща ›
последна »
471057 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all