Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Nunes, Sérgio Rodrigues
.
Value focused assessment of cyber risks to gain benefits from security investments
In
Instituto Superior de Economia e Gestão
. Vol. Doutor em Gestão. Universidade de Lisboa, 2018.
Apple, Benjamin G.
.
How the adoption of the big-data paradigm affects the key factors that influence the effectiveness of an information assurance (IA) framework: A multiple-case study
. Capella University, 2017.
Нигматуллин, Ришат Вахид
, and
Римма Рифха Сулейманова
.
"
Стратегия ООН в борьбе с транснациональной организованной преступностью
."
Всероссийский криминологический журнал
(2016).
Carr, Chadd
.
Exploration into the Types, Operational Areas, and Peripheral Resources of Cyber Threat Intelligence: An Expert Panel Delphi Study
. Northcentral University, 2017.
Готчина, Лариса Влади
.
"
Криминологическая характеристика российской наркопреступности: структура, динамика и прогноз
."
Всероссийский криминологический журнал
(2017).
Bichler, Gisela
,
Aili Malm
, and
Tristen Cooper
.
"
Drug supply networks: a systematic review of the organizational structure of illicit drug trade
."
Crime ScienceAn Interdisciplinary Journal
6, no. 2 (2017).
Zheng, Quan
, and
David B. Skillicorn
.
"
Analysis of criminal social networks with typed and directed edges
." In
IEEE International Conference on Intelligence and Security Informatics (ISI)
. Baltimore, MD, USA , 2015.
Bright, David
,
Johan Koskinen
, and
Aili Malm
.
"
Illicit Network Dynamics: The Formation and Evolution of a Drug Trafficking Network
."
Journal of Quantitative Criminology
(2018): 1-22.
Malm, Aili
,
Martin Bouchard
,
,
Marieke Vlaemynck
, and
Marije Wouters
.
"
More structural holes, more risk? Network structure and risk perception among marijuana growers
."
Social Networks Volume
51 (2017): 127-134.
Bahulkar, Ashwin
,
Boleslaw K. Szymanski
,
Orkun N. Baycik
, and
Thomas C. Sharkey
.
"
Community detection with edge augmentation in criminal networks
." In
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
. Barcelona, Spain , 2018.
Zheng, Quan
, and
David Skillicorn
.
Social Networks with Rich Edge Semantics (Open Access)
. Boca Raton: CRC Press, 2017.
Bahulkar, Ashwin
,
Orkun N. Baycik
,
Thomas Sharkey
,
Yeming Shen
,
Boleslaw Szymanski
, and
William Wallace
.
"
Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks
." In
IEEE International Symposium on Technologies for Homeland Security (HST)
. Woburn, MA, USA , 2018.
Zheng, Quan
.
Spectral Techniques for Heterogeneous Social Networks
In
School of Computing
. Vol. Doctor of Philosophy . Ontario, Canada: Queen’s University Kingston, 2016.
Backman, Sarah
.
The institutionalization of cybersecurity management at the EU-Level: 2013-2016
In
Swedish National Defence College
. Vol. Master. Swedish Defence University, 2016.
Cullen, Daniel Thomas
.
Building a Computer Security Incident Response Team: Required Skills and Characteristic
. Vol. Dissertation. Northcentral University, 2018.
Quisumbing, Lowell A.
.
"
Global Perspectives on Cyber security Using Latent Dirichlet Allocation Algorithm
."
International Journal of Applied Engineering Research
12, no. 20 (2017): 10310-10323.
De Prijck, Anke
.
The terminology of cybercrime. A contribution to the IATE-CvT project (English-Dutch-Spanish)
In
Faculteit Letteren & Wijsbegeerte
. Vol. Master in het Vertalen. Universiteit Gent, 2016.
Tumkevič, A.
.
"
Uncertain Security Community: Building Western Cyber-Security Order
."
Journal of Information Warfare; Yorktown
17, no. 1 (2018): 74-86.
Demchak, Chris
,
Jason Kerben
,
Jennifer McArdle
, and
Francesca Spidalieri
.
United States of America: Cyber Readiness at a Glance
. Potomac Institute for Policy Studies, 2016.
F., III. Scalise Be
.
Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare
. Vol. Dissertation. Colorado Technical University, 2019.
Tumkevič, Agnija
.
Tarptautinio bendradarbiavimo ir konflikto potencialas kibernetinėje erdvėje
. Vol. Daktaro disertacija. Vilniaus Universitetas, 2019.
Ismail, Mohamed
.
Sony Pictures and the U.S. Federal Government: A Case Study Analysis of the Sony Pictures Entertainment Hack Crisis Using Normal Accidents Theory
In
College of Arts and Letters, and the Department of Communication Studies
. Vol. Master of Arts. University of Southern Mississippi, 2017.
Sadiku, Matthew N. O.
,
Adebowale E. Shadare
,
Sarhan M. Musa
, and
Cajetan M. Akujuobi
.
"
Cyberterrorism
."
Journal of Multidisciplinary Engineering Science and Technology (JMEST)
3, no. 12 (2016).
Kil, A.N.
.
Small States and Cyber Security: The cases of Estonia, Lithuania, Georgia and Moldova
. Vol. Bachelor., 2018.
Bates, Justin D.
.
Ways to Improve DoD 8570 IT Security Certification
. Colorado Technical University, 2017.
Pages
« първа
‹ предишна
…
362
363
364
365
366
367
368
369
370
…
следваща ›
последна »
470357 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all