Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Committee on National Security Systems
.
Committee on National Security Systems (CNSS) Glossary
. CNSSI, 2015.
CSRC
.
Resilience
In
Glossary
. Csrc.Nist.Gov, 2020.
Hogan, Michael
, and
Elaine Newton
.
Supplemental Information for The Interagency Report On Strategic U.S. Government Engagement In International Standardization To Achieve U.S. Objectives For Cybersecurity
., 2015.
Guelfi, Nicolas
.
"
A Formal Framework for Dependability and Resilience from A Software Engineering Perspective
."
Open Computer Science
1, no. 3 (2011): 294-328.
Bodeau, Deborah
,
Richard Graubart
,
Rosalie McQuaid
, and
John Woodill, Jr.
.
Cyber Resiliency Metrics and Scoring in Practice--Use Case Methodology and Examples
. The MITRE Corporation, 2018.
Kharchenko, Vyacheslav
.
"
Dependable systems and multi-version computing: aspects of evolution
."
Radioelectronic and computer systems
7 (2009): 46-59.
Koutny, Maciej
, and
Brian Randell
.
"
Structured Occurrence Nets: A Formalism for Aiding System Failure Prevention and Analysis Techniques
."
Fundamenta Informaticae
97, no. 1-2 (2009): 41-91.
Kharchenko, Vyacheslav
,
Yuriy Ponochovnyi
,
Artem Boyarchuk
, and
Eugene Brezhnev
.
"
Resilience Assurance for Software-Based Space Systems with Online Patching: Two Cases
."
Dependability Engineering and Complex Systems
470 (2016): 267-278.
Kharchenko, Vyacheslav
,
Yuriy Ponochovnyi
, and
Artem Boyarchuk
.
"
Availability Assessment of Information and Control Systems with Online Software Update and Verification
."
Information and Communication Technologies in Education, Research, And Industrial Applications
469 (2014): 300-324.
Dotsenko, Sergiy
.
"
Principle of the total organization of intellectual systems
."
Radioelectronic and computer systems
1 (2019): 4-16.
Commission, European
.
Smart and healthy ageing through people engaging in supportive systems
., 2019.
Korhonen, Eila-Sisko
,
Tina Nordman
, and
Katie Eriksson
.
"
Technology and its ethics in nursing and caring journals: An integrative literature review
."
Nursing Ethics
22, no. 5 (2015): 561-576.
Alapuranen, N.
.
"
SHAPES privacy and data protection
." In
D8.4 – SHAPES Ethical Framework
, 48-59. Brussels: European Commission, 2020.
SecureHospitals
., 2020.
The Finnish Cyber Trust Program 2015–2017
. Helsinki: DIMECC, 2017.
Linkov, Igor
,
Todd Bridges
,
Felix Creutzig
,
Jennifer Decker
,
Cate Fox-Lent
,
Wolfgang Kröger
,
James Lambert
,
Anders Levermann
,
Benoit Montreuil
,
Jatin Nathwani
et al.
"
Changing the resilience paradigm
."
Nature Climat Change
4, no. 6 (2014): 407-409.
Alberts, David
.
Information age transformation, getting to a 21st century military. DOD Command and Control Research Program
., 2002.
Council, National Research
.
Disaster Resilience: A National Imperative
. Washington, DC: The National Academies Press, 2012.
Linkov, Igor
,
Daniel Eisenberg
,
Kenton Plourde
,
Thomas P. Seager
,
Julia Allen
, and
Alexander Kott
.
"
Resilience metrics for cyber systems
."
Environment Systems & Decisions
33, no. 4 (2013).
Kott, Alexander
, and
Igor Linkov
.
Cyber Resilience of Systems and Networks. Risk, System and Decisions
. Cham: Springer, 2019.
Heinimann, Hans
, and
Kirk Hatfield
.
"
Infrastructure Resilience Assessment, Management and Governance – State and Perspectives
." In
Resilience and Risk
, 147-187. Cham: NATO Science for Peace and Security Series C: Environmental Security, Springer , 2017.
Kokkonen, Tero
.
"
Anomaly-Based Online Intrusion Detection System as a Senor for Cyber Security Situational Awareness System
."
Jyväskylä studies in computing, University of Jyväskylä
251 (2016).
Rajamäki, Jyri
, and
Rauno Pirinen
.
Towards the cyber security paradigm of eHealth: Resilience and design aspects
In
Proceedings of the 1st International Conference on Applied Mathematics and Computer Science
. Vol. 1836. Melville: AIP Publishing, 2017.
FortiWeb 5.7.1 Administration Guide: Solutions for specific web attacks
. Fortine, 2020.
Internet Security Threat Report. Vol. 24
. Symantec, 2019.
Pages
« първа
‹ предишна
…
421
422
423
424
425
426
427
428
429
…
следваща ›
последна »
469598 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all