Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Bigelow, Brad
.
"
The Topography of Cyberspace and Its Consequences for Operations
." In
10th International Conference on Cyber Conflict
. Tallinn: NATO CCD COE, 2018.
Bakis, Bruce J.
, and
Edward D. Wang
.
Building a National Cyber Information-Sharing Ecosystem
. MITRE Corporation, 2017.
NESA
.
EP3R 2013 – Position Paper of the EP3R Task Forces on Trusted Information Sharing (TF-TIS
. European Union Agency for Network and Information Security, 2013.
NESA
.
Public Private Partnerships (PPP) Cooperative models
. European Union Agency for Network and Information Security, 2017.
Migration and Home Affairs
. Information exchange, European Commission, 2019.
Commission, European
.
Joint Communication to The European Parliament, The Council, The European Economic and Social Committee and The Committee of the Regions
. Brussels, 2013.
Commission, European
.
EU-U.S. Privacy Shield: stronger protection for transatlantic data flows
. Brussels, 2016.
NIS Directive
In
Homepage of European Union Agency for Network and Information Security
., 2019.
Lehto, Martti
,
Jarno Limnéll
,
Tuomas Kokkomäki
,
Jouni Pöyhönen
, and
Mirva Salminen
.
Kyberturvallisuuden strateginen johtaminen Suomessa
In
Julkaisusarja
. Helsinki: Valtioneuvoston kanslia, 2018.
Fovino, Igor Nai
,
Ricardo Neisse
,
Alessandro Lazari
,
Gian-Luigi Ruzzante
,
Nineta Polemi
, and
Malgorzata Figwer
.
European Cybersecurity Centres of Expertise Map – Definitions and Taxonomy
. Luxembourg: Publications Office of the European Union, 2018.
Yin, Robert K.
.
Study Research, Design and Methods
. 5th ed. Thousand Oaks: Sage Publications, 2014.
Skopik, Florian
,
Giuseppe Settanni
, and
Roman Fiedler
.
"
A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing
."
Computers and Security
60 (2016).
Skorupka, Clement W.
, and
Lindsley G. Boiney
.
Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations
. MITRE Corporation, 2016.
MITRE Corporation
.
Cyber Information-Sharing Models: An Overview
., 2012.
Datsenko, Liudmyla
,
Oleksii Mikhno
, and
Mykola Molochko
.
"
Education in Geomatics for First Line Emergency Management in Ukraine
."
Information & Security: An International Journal
40, no. 2 (2018): 205-211.
Hevner, Alan
, and
Samir Chatterjee
.
Design research in information systems: theory and practice
. New York: Springer Science and Business Media, 2010.
MARISA
.
MARISA Maritime Integrated Surveillance Awareness
., 2018.
March, Salvatore T.
, and
Gerald F. Smith
.
"
Design and natural science research on information technology
."
Decision Support Systems
15, no. 4 (1995): 251-266.
European Test bed for the maritime Common Information Sharing Environment in the 2020 perspective
. UCISE2020, 2019.
MARISA
.
D3.2 MARISA Services Description Document
., 2018.
MARISA
.
D2.6 Legal, Ethical and Societal Aspects
In
project
., 2017.
Krempel, Erik
, and
Jürgen Beyerer
.
"
TAM-VS: A Technology Acceptance Model for Video Surveillance
." In
Privacy Technologies and Policy, Lecture Notes in Computer Science
, 86-100. Vol. 8450. Cham: Springer, 2014.
Rajamäki, Jyri
,
Sari Sarlio-Siintola
, and
Jussi Simola
.
Ethics of Open Source Intelligence Applied by Maritime Law Enforcement Authorities
In
17th European Conference on Cyber Warfare and Security ECCWS
. Oslo, Norway, 2018.
Hustinx, Peter
.
"
Privacy by Design: Delivering the Promises
."
Identity in the Information Society
3, no. 2 (2010): 253-255.
Cavoukian, Ann
.
Privacy by Design: The 7 Foundational Principles
. Ontario : Information and Pri¬vacy Commissioner of Ontario , 2011.
Pages
« първа
‹ предишна
…
385
386
387
388
389
390
391
392
393
…
следваща ›
последна »
470303 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all