Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Mohammadzadeh, Mohsen
.
The Neoliberalised City Fantasy: The place of desire and discontent
. Vol. Doctor of Philosophy. University of Auckland, 2014.
Lupu, Catalin
,
Valeriu Lupu
, and
Gîlc Gheorghe
.
Securing online banking services using iris recognition
In
Annals of the "Constantin Brancusi" University of Targu Jiu, Engineering Series
., 2015.
Abikoye, O.C.
,
J.O. Omolehin
, and
J.S. Sadiku
.
"
Some Refinement on Iris Localization Algorithm
."
International Journal of Engineering and Technology
2, no. 11 (2012).
Forster, Benjamin
.
NATO's Role in the Global War on Terror: Is the Alliance Obsolete?
In
Claremont-UC Undergraduate Research Conference on the European Union
. Vol. 2009., 2012.
Wei, Li
, and
Xue Li
.
"
Maritime Silk Road in the 21st Century: Security Risks and Countermeasures (21 世纪海上丝绸之路: 安全风险及其应对)
."
Taiping Ocean News
(2015).
Stuppia, Giuseppe
.
Pirateria e diritto internazionale: dalle vicende somale al caso Enrica Lexie
. Vol. Dottorato di ricerca in Diritto internazionale e dell’Unione europea – XXIV Ciclo. Sapienza, Universita di Roma, 2013.
Frühling, Stephan
.
"
“Key to the defense of the free world”: The past, present and future relevance of NATO for US allies in the Asia–Pacific
."
Journal of Transatlantic Studies
(2019): 1-17.
Beskow, David M.
, and
Kathleen M. Carley
.
"
Social Cybersecurity An Emerging National Security Requirement
."
Military Review
(2019).
.
"
Revealing the propaganda of communication between the islamic fundamentalism activists of the middle east and Indonesia
."
Jurnal Komunikasi: Malaysian Journal of Communication
34, no. 2 (2018): 137-151.
Holbrook, D.
.
"
A critical analysis of the role of the internet in the preparation and planning of acts of terrorism
."
Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide
4, no. 2 (2015): 121-133.
Hai-Jew, S.
.
"
Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis
." In
Cyber Behavior: Concepts, Methodologies, Tools, and Applications
, 1260-1294 ., 2014.
Carlile, L.
, and
S. MacDonald
.
"
The criminalisation of terrorists' online preparatory acts
." In
Cyberterrorism: Understanding, Assessment, and Response
, 155-173., 2014.
Lawson, S.
.
"
The US military's social media civil war: technology as antagonism in discourses of information-age conflict
."
Cambridge Review of International Affairs
27, no. 2 (2014): 226-245.
Acharya, A.
.
Ten years after 9/11: Rethinking the jihadist threat
., 2013.
Ogun, M.N.
.
"
Terrorist Use of Internet: Possible Suggestions to Prevent the Usage for Terrorist Purposes
."
Journal of Applied Security Research
7, no. 2 (2012): 203-217.
Veerasamy, N.
, and
M. Grobler
.
"
Terrorist use of the internet: Exploitation and support through ICT infrastructure
." In
6th International Conference on Information Warfare and Security, ICIW 2011
. Washington, DC; United States, 2011.
Maled, V.
.
"
Computer forensics: A tool to prevent cybercrime
."
Journal of South India Medicolegal Association
2, no. 2 (2010): 60-63.
Conway, Maura
.
"
Terrorism and the Internet: New media - New threat?
"
Parliamentary Affairs
59, no. 2 (2006): 283-298.
Vatsa, Mayank
,
Richa Singh
,
Afzel Noore
, and
Arun Ross
.
"
On the Dynamic Selection of Biometric Fusion Algorithms
."
IEEE Transactions on Information Forensics and Security
5, no. 3 (2010).
Vatsa, M.
,
R. Singh
,
A. Noore
, and
S.K. Singh
.
"
Belief Function Theory Based Biometric Match Score Fusion: Case Studies in Multi-instance and Multi-unit Iris Verification
." In
Seventh International Conference on Advances in Pattern Recognition
. Kolkata, India , 2009.
Khalkhali, Arezou Moussavi
,
Behzad Moshiri
, and
Hamid Reza Momeni
.
"
Design of an Intelligent Housing System Using Sensor Data Fusion Approaches
." In
Sensor and Data Fusion
., 2009.
Ben Dhiaf, Zouhour
,
Fatm Haouas
, and
Atef Hamouda
.
"
Contributions in belief functions and plausible and paradoxical reasoning theories: Application to supervised classification of satellite images
." In
International Image Processing, Applications and Systems Conference
. Sfax, Tunisia, 2014.
Gao, Jian
,
Jingjing Yan
, and
Zuyun Duanmu
.
"
Notice of Retraction Evidential reasoning based on the fuzzy beliefs
." In
3rd International Conference on Computer Science and Information Technology
. Chengdu, China, 2010.
Haouas, Fatma
, and
Zouhour Ben Dhiaf
.
"
New contributions into the Dezert-Smarandache theory: Application to remote sensing image classification
." In
6th International Conference of Soft Computing and Pattern Recognition (SoCPaR)
. Tunis, Tunisia , 2014.
Smarandache, Florentin
, and
Jean Dezert
.
"
Fusion of qualitative beliefs
." In
Advances and Applications of DSmT for Information Fusion
. Collected Works ed. Vol. 2. American Research Press Rehoboth, 2006.
Pages
« първа
‹ предишна
…
352
353
354
355
356
357
358
359
360
…
следваща ›
последна »
470955 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all