Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Meltzer, Joshua P.
.
"
The Internet, Cross-Border Data Flows and International Trade
."
SSRN Electronic Journal
(2013).
Tang, Wenfang
, and
Shanto Iyengar
.
Political Communication in China: Convergence or Divergence Between the Media and Political System?
. London: Routledge, 2012.
Dalha, Tenzin
.
Assertion of China’s Sovereignty over the Internet
. global-is-asian, 2018.
Shahbaz, Adrian
.
Freedom on the Net 2018: The Rise of Digital Authoritarianism
. Freedom House, 2018.
Sherman, Justin
.
"
How to Regulate the Internet Without Becoming a Dictator
."
Foreign Policy
(2019).
Saakashvili, Eduard
.
The Global Rise of Internet Sovereignty
. .coda, 2019.
Valeriano, Brandon
,
Benjamin Jensen
, and
Ryan C. Maness
.
Cyber Strategy: The Evolving Character of Power and Coercion
. Oxford Scholarship Online, 2018.
Kerttunen, Mika
, and
Eneken Tikk
.
Strategically Normative. Norms and Principles in National Cybersecurity Strategies
In
EU Cyber Direct
., 2019.
United States Cyber Command
.
Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command
., 2018.
NATO Warns Russia of ‘Full Range’ of Responses to Cyberattack
. Security Week, 2019.
Clarke, Richard A.
, and
Robert K. Knake
.
Cyberwar: The Next Threat to National Security and What to Do About It
. New York, NY: Harper Collins, 2010.
Goel, Sanjay
, and
Hany A. Shawky
.
"
Estimating the Market Impact of Security Breach Announcements on Firm Values
."
Information & Management
46, no. 7 (2009): 404-410.
Clapper, James R.
,
Marcel Lettre
, and
Michael S. Rogers
.
Joint Statement for the Record to the Senate Armed Services Committee ‘Foreign Cyber Threats to the United States’
., 2017.
Schaap, Arie J.
.
"
Cyber Warfare Operations: Development and Use Under International Law
."
Air Force Law Review
64 (2009): 121-173.
Dévai, Dóra
.
"
Proliferation of Offensive Cyber Weapons. Strategic Implications and Non-Proliferation Assumptions
."
Academic and Applied Research in Military and Public Management Science (AARMS)
15, no. 1 (2016): 61-73.
Leiner, Barry M.
.
"
A Brief History of the Internet
."
ACM SIGCOMM Computer Com¬mu¬nication Review
39, no. 5 (2009): 22-31.
Armstrong, Helen L.
, and
Patrick J. Forde
.
"
Internet Anonymity Practices in Computer Crime
."
Information Management and Computer Security
11, no. 5 (2003): 209-215.
Goel, Sanjay
.
"
Anonymity vs. Security: The Right Balance for the Smart Grid
."
Communications of the Association for Information Systems
36, no. Article 2 (2015): 23-32.
Goel, Sanjay
.
"
Cyberwarfare: Connecting the Dots in Cyber Intelligence
."
Communications of the ACM
54, no. 8 (2011): 132-140.
Healey, Jason
.
Beyond Attribution: Seeking National Responsibility for Cyber Attacks
In
January Issue Brief 2012
. Atlantic Council, 2012.
Ahmed, Rizwan
, and
Rajiv V. Dharaskar
.
"
Mobile Forensics: An Overview, Tools, Future Trends and Challenges from Law Enforcement Perspective
." In
6th International Conference on E-Governance, ICEG, Emerging Technologies in E-Government, M-Government
., 2008.
Lillard, Terrence V.
,
Clint P. Garrison
,
Craig A. Schiller
, and
James Steele
.
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
. Syngress Publishing, 2010.
Solomon, Michael G.
,
K. Rudolph
,
Ed Tittel
,
Neil Broom
, and
Diane Barrett
.
Computer Forensics Jumpstart
. Indianapolis, IN: Wiley Publishing Inc., 2011.
Casey, Eoghan
.
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet
. Boston, MA: Academic Press, 2011.
McCarthy, N.K.
.
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
. McGraw-Hill Osborne Media, 2012.
Pages
« първа
‹ предишна
…
398
399
400
401
402
403
404
405
406
…
следваща ›
последна »
469663 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all