Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Hua, Jian
, and
Sanjay Bapna
.
Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking
In
CIS 2011 Proceedings
. Vol. 4., 2011.
Musarurwa, Alfred
, and
Husin Jazri
.
"
A proposed framework to measure growth of Critical Information Infrastructure Protection in Africa
." In
2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)
. Windhoek, Namibia: IEEE, 2015.
Mohideen, Feroze
.
The Cyber-Security State of our Nation: A Critique of South Africas Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure
In
ICCWS 2016 11th International Conference on Cyber Warfare and Security
., 2016.
Hamida, Yaou
,
Baina Amine
, and
Bellafkih Mostafa
.
"
Toward resilience management in critical information infrastructure
." In
2015 5th World Congress on Information and Communication Technologies (WICT)
. Marrakech, Morocco : IEEE, 2015.
Ahmad, Arniyati
.
A cyber exercise post assessment framework: In Malaysia perspectives
In
School of Computing Science, College of Science and Engineering
. Vol. Doctor of Philosophy. University of Glasgow, 2016.
von Solms, R
, and
B von Solms
.
"
National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
." In
Iccws 2015 - The Proceedings of the 10th International Conference on Cyber Warfare and Security
. South Africa, 2015.
Amideo, Annunziata Esposito
, and
Maria Paola Scaparra
.
A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability
In
Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science
. Vol. 10242. Paris, France , 2017.
Gelbstein, Eduardo E.
.
"
Designing a Security Audit Plan for a Critical Information Infrastructure (CII)
." In
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
, 262-285., 2013.
Setiawan, Ahmad Budi
.
"
Peningkatan Keamanan Supervisory Control and Data Acquisition (Scada) Pada Smart Grid Sebagai Infrastruktur Kritis
."
Jurnal Penelitian Pos dan informatika
6, no. 1 (2016).
Martins, José
,
Henriques dos Santos
, and
Paulo Nunes
.
"
Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação
."
Proelium (Revista Científica da Academia Militar)
VII (2012): 31-66.
Musarurwa, Alfred
, and
Husin Jazri
.
"
A Proposed Framework to Measure Growth of Critical Information Infrastructure Protection in Africa
." In
Conference: International Conference on Emerging Trends in Network and Computer Communication
. Namibia, 2014.
Martin, Ioana
.
Critical Information Infrastructure Protection: Towards Global Cyber Security
In
Regional Department of Defense Resources Management Studies
. Romanian National Defense University, 2014.
Herrera, Luis-Carlos
, and
Olaf Maennel
.
"
A comprehensive instrument for identifying critical information infrastructure services
."
International Journal of Critical Infrastructure Protection
25 (2019): 50-61.
Deliverable D7.1: Review of the State-of-the-Art in Cyberattacks
In
Seventh Framework Programme Information & Communication Technologies Trustworthy ICT, Network of Excellence
., 2011.
Velasquez, Luis Carlos Her
.
A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
In
Institute of Computer Science, Cyber Security Curriculum
. Vol. Master’s Thesis. University of Tartu, 2016.
Njotini, MN
.
"
Protecting Critical Databases: Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa
."
Potchefstroom Electronic Law Journal
16, no. 1 (2013).
Unger, Brigitte
, and
Johan den Hertog
.
"
Water always finds its way: Identifying new forms of money laundering
."
Crime, Law and Social Change
57, no. 3 (2012): 287-304.
Odi, Nwankwo
, and
Onyekachi Richard Eze
.
"
Electronic Payment in Cashless Economy of Nigeria: Problems and Prospect
."
Journal of Management Research
5, no. 1 (2013).
Tsakalidis, George
, and
Kostas Vergidis
.
"
A Systematic Approach Toward Description and Classification of Cybercrime Incidents
."
IEEE Transactions on Systems, Man, and Cybernetics: Systems
(2017): 1-20.
Correia, Pedro Miguel Alv
, and
Inês Oliveira A. de Jesus
.
"
Combate às transferências bancárias ilegítimas pela Internet no direito português: entre as experiências domésticas e políticas globais concertadas
."
Revista Direito GV
12, no. 2 (2016).
Mehmet, Murad
, and
Duminda Wijesekera
.
"
Ontological Constructs to Create Money Laundering Schemes
." In
STIDS 2010 Proceedings
., 2010.
Dumitrache, AA
,
A Boroi
, and
F Pusca
.
Recent technological tendencies of money laundering
In
Annals of DAAAM & Proceedings
. Vienna: DAAAM International, 2011.
Tsakalidis, George
.
Camco a framework for classification, analysis & monitoring cybercrime-related offences
. Vol. Master’s Thesis. University of Macedonia, 2016.
Romani, Alessia
.
Money laundering and financial crimes: a comparison between criminal and legal firms
In
Dipartimento di Scienze Economiche
. Vol. Magistrale in Business Administration. Universita‟ Degli Studi Di Padova , 2016.
Onyeagba, Justus B. C.
, and
Ilokanulo N. Samuel
.
"
Impact of Cashless Banking System of Payment on Entrepreneurial Activities in Anambra State
."
IJMPAS
1, no. 2 (2015).
Pages
« първа
‹ предишна
…
346
347
348
349
350
351
352
353
354
…
следваща ›
последна »
471014 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all