Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Greenberg, Andy
.
CISA Security Bill: An F for Security But an A+ for Spying
. Wired, 2015.
Verizon Data Breach Investigation Report 2019
. Verizon business ready, 2019.
Microsoft Corporation
.
Five Principles for Shaping Cybersecurity Norms
., 2013.
Private Sector Engagement in Responding to the Use of the Internet and ICT for Terrorist Purposes: Strengthening Dialogue and Building Trust
. Security Council, Counter-Terrorism Committee, 2018.
EU Agency for Network and Information Security
.
European Public Private Partnership for Resilience
., 2014.
Philips, Mark
,
Jennifer Cole
, and
Jennifer Towers
.
Cyber Norms of Behaviour: Executive Summary
. Royal United Services Institute, 2018.
Capacity Building in Cyberspace: Taking Stock
In
Event Report, EU, Institute for Secu¬rity Studies, A seminar organized in the framework of the EUISS Cyber Task Force
. Brussels, 2013.
International Telecommunication Union
.
Global Partnerships with Industry Players
., 2018.
OAS and Symantec to Present Cyber Security Report on June 2nd
. Organization of American States, Press Department, 2014.
The Need for Digital Geneva Convention
., 2017.
Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security
. United Nations General Assembly, 2015.
Fact Sheet: President Xi Jinping’s State Visit to the United States
. The White House, Office of the Press Secretary, 2015.
Regulation (EU) 2016/679 of the European Parliament and of the Council
., 2016.
Directive (EU) 2016/1148 of the European Parliament and of the Council
., 2016.
Regulation (EU) No 910/2014 of the European Parliament and of the Council
., 2014.
Regulation (EU) 2019/881 of the European Parliament and of the Council
. ENISA, 2019.
Europol
.
Botnet Taken Down through International Law Enforcement Cooperation
., 2019.
Transformation, NATO Allied Com
.
Lock Your Shields and Brace for Impact
., 2013.
Executive Order — Improving Critical Infrastructure Cybersecurity
. The White House, Office of the Press Secretary, 2013.
PricewaterhouseCoopers LLP
.
Why You Should Adopt the NIST Cybersecurity Framework
., 2014.
Tworek, Heidi
.
Microsoft Is Right: We Need A Digital Geneva Convention
In
Opinion
., 2017.
Poryazov, Stoyan
,
Dmytro Progonov
,
Emiliya Saranova
, and
Zlatogor Minchev
.
Performance Prediction in Secure Telecommunication System with Quality of Service Guarantees
In
The 9th International Conference on Business Information Security (BISEC-2017)
. Belgrade, Serbia, 2017.
Poryazov, Stoyan
,
Dmytro Progonov
, and
Emiliya Saranova
.
"
Quality of Telecommunications as a Composition of Qualities of Subservices, Including Security and Trusted Third Parties
." In
2017 25th Telecommunication Forum (TELFOR)
. Belgrade, Serbia, 2017.
Boulton, Clint
.
What is Digital Transformation? A Necessary Disruption
. CIO, 2019.
Beck, Ulrich
.
Risk Society. Towards a New Modernisation
. London: SAGE, 1992.
Pages
« първа
‹ предишна
…
380
381
382
383
384
385
386
387
388
…
следваща ›
последна »
470316 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all