Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Montenegro’s Accession to NATO is ‘One of the Biggest Betrayals in History’
. Sputnik News, 2017.
Knezevic, Gordana
.
Moscow Bad-Mouths Montenegro, But Russians Still Flocking to Its Beaches
. Radio Free Europe, 2017.
"
Đukić potpisao osnivanje Prave Crne Gore [Djukic Signed the Founding of True Montenegro]
."
Pobjeda
(2018): 3.
Tomović, Predrag
.
Crna Gora protjeruje ruskog diplomatu [Montenegro Expels a Russian Diplomat]
. Radio Slobodna Evropa, 2018.
McCain, John
.
"
McCain Flashback: Russia Threat is Dead Serious. Montenegro Coup and Murder Plot Proves It
."
USA Today
(2017).
Galeotti, Mark
.
Controlling Chaos: How Russia Manages Its Political War in Europe
In
Policy Brief
. London: European Council on Foreign Relations, 2017.
Elewa, Akinwande A.
.
Remote Sensing and Detection of Oil Spill Dispersions
., 2010.
Longstaff, Patricia H.
,
Nicholas J. Armstrong
,
Keli Perrin
,
Whitney May Parker
, and
Matthew A. Hidek
.
"
Building Resilient Communities: A Preliminary Framework for Assessment
."
Homeland Security Affairs
VI, no. 3 (2010).
Ekengren, Magnus
.
"
A return to geopolitics? The future of the security community in the Baltic Sea Region
."
Global Affairs
4, no. 4-5 (2018).
Balabán, Miloš
, and
Bohuslav Pernica
.
Bezpečnostní systém ČR: problémy a výzvy
. Prague: Charles University in Prague, Karolinum Press, 2015.
Amatulli, Giuseppe
, and
Joëlle Klein
.
"
Community security of indigenous peoples in the Barents Region
." In
Society, Environment and Human Security in the Arctic Barents Region
. London: Routledge, 2018.
Omelicheva, Mariya Y.
.
Counterterrorism Policies in Central Asia
. London, U.K.: Routledge, 2010.
Ak, Tarık
.
"
Dünyada iç güvenlik yaklaşiminin değişimi ve iç güvenlik yönetimine etkisi
."
Van Yüzüncü Yıl Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi
3, no. 6 (2018).
Ak, Tarık
.
"
Toplumsal Güvenlik Bağlamında İç Güvenlik Yaklaşımı
."
Akademik Hassasiyetler
5, no. 10 (2018).
Dimov, Stefan L.
.
Assessing the threat of islamically motivated terrorism in Bulgaria
. Monterey, California: Naval Postgraduate School, 2015.
Minchev, Zlatogor
.
"
Intelligent Scenario Development for Computer Assisted eXercises
." In
Scientific Support for the Decision Making in the Security Sector
. IOS Press, 2006.
Минчев, Златогор
,
Николай Павлов
,
Ирена Николова
,
Николай Томов
, and
Александър Цанков
.
Програмна структура на система за КПУ по управление в извънредни ситуации
In
Първа национална научно-практическа конференция по управление в издънредни ситуации и защита на населението
. София: ИМИ - БАН, секция ИО, 2005.
Alakpa, George Edafese U.
.
Perceptions of military personnel: Analysis of the Department of Defense's counter bioterrorism measures at the tactical level for the enhancement of civil security, leadership, management, and policy
. Vol. Doctor of Science. New Jersey City University, 2015.
Liberty, Arthur A.
.
Measuring the impact of 9/11 on the functionality of local emergency planning committees and the public disclosure of hazardous chemical information
. Vol. Doctor of Science . New Jersey City University, 2015.
Brázová, Věra – Karin
.
"
Response of Central European Civil Security Systems to the Economic Crisis
."
Central European Journal of Public Policy
9, no. 2 (2015).
Bernard, Gregory M.
.
Who is Professor Plum? A framework for defining non-state adversaries
. Vol. Doctor of Science. New Jersey City University, 2016.
Kortjan, Noluxolo
, and
Rossouw von Solms
.
Cyber Security Education in Developing Countries: A South African Perspective
In
e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
. Vol. 119. Berlin, Heidelberg: Springer, 2012.
Mavee, S.M.A.
, and
E.M. Ehlers
.
A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power Grid
In
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
. Liverpool, UK: IEEE, 2012.
Setiawan, Ahmad Budi
,
Aries Syamsudin
, and
Ashwin Sasongko
.
"
Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity
." In
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec)
. Jakarta, Indonesia : IEEE, 2015.
Christensen, Sharon
,
William J. Caelli
,
William D. Duncan
, and
Eugenia Georgiades
.
"
An Achilles heel: denial of service attacks on Australian critical information infrastructures
."
Information & Communications Technology Law
19, no. 1 (2010).
Pages
« първа
‹ предишна
…
345
346
347
348
349
350
351
352
353
…
следваща ›
последна »
471019 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all