Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Fishbein, Martin
, and
Icek Ajzen
.
Predicting and Changing Behavior: The Reasoned Action Approach
. New York: Psychology Press, 2010.
Ajzen, Icek
,
Cornelia Czasch
, and
Michael Flood
.
"
From Intentions to Behavior: Implementation Intention, Commitment, and Conscientiousness
."
Journal of Applied Social Psychology
39, no. 6 (2009): 1356-7.
Fishbein, Martin
, and
Icek Ajzen
.
Belief, Attitude, Intention, and Behaviour: An introduction to theory and research
. MA: Addison-Wesley, 1975.
Gerber, Nina
,
Paul Gerber
, and
Melanie Volkamer
.
"
Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior
."
Computers and Security
77 (2018).
NEN-EN-ISO/IEC 27002: Information technology - Security techniques – Code of practice for information security controls
., 2017.
Parsons, Kathryn
,
Agata McCormac
,
Malcolm Pattinson
,
Marcus Butavicius
, and
Cate Jerram
.
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations
In
Proceedings of theEuropean Information Security Multi-Conference (EISMC 2013)
., 2013.
Sue, Valerie
, and
Lois Ritter
.
Conducting Online Surveys
. Thousand Oaks, CA: Sage Publications, 2012.
Dwyer, Evelyn
.
Attitude Scale Construction: A Review of the literature
. ERIC Institute of Education Sciences, 1993.
Mayer, Peter
,
Alexandra Kun
, and
Melanie Volkamer
.
Reliable Behavioural Factors in the Information Security Context
In
ACM International Conference Proceeding Series
. Vol. Part F1305., 2017.
Lohrmann, Dan
.
"
Cyber Range: Who, What, When, Where, How and Why?
"
Government Technology Magazine
31, no. 2 (2018): 529-551.
Mirkovic, Jelena
,
Terry V. Benzel
,
Ted Faber
,
Robert Braden
,
John Wroclawski
, and
Stephen Schwab
.
The DETER Project
In
The DETER Project," in IEEE International Conference on Technologies for Homeland Security (HST ’10)
., 2010.
Ferguson, Bernard
,
Anne Tall
, and
Denise Olsen
.
National cyber range overview
In
IEEE Military Communications Conference, Baltimore, MD, USA,
., 2010.
The Michigan Cyber Range
. MCR, 2020.
Lee, Rossey
.
"
SimSpace Cyber Range
." In
Panel: Cyber Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research
. Boston, United States, 2015.
Weiss, Richard
,
Franklyn Turbak
,
Jens Mache
, and
Michael Locasto
.
"
Cybersecurity Education and Assessment in EDURange
."
IEEE Security & Privacy
15, no. 3 (2017): 90-95.
Estonian Ministry of Defence
.
Estonian Defence Force’s Cyber Range
., 2014.
Prior, Tim
, and
Florian Roth
.
CSS Study: Learning from Disaster Events and Exercises in Civil protection Organizations
In
Risk and Resilience Reports
. Zurich: Center for Security Studies, 2016.
Hoffman, Lance
,
Timothy Rosenberg
,
Ronald Dodge
, and
Daniel Ragsdale
.
"
Exploring a national cybersecurity exercise for universities
."
IEEE Security and privacy
3, no. 5 (2005): 27-33.
Andreev, Evgeni
,
Mariya Nikolova
,
Veselka Radeva
, and
Georgi Bochev
.
Creating Moon Port and Spaceship Simulations in A Virtual Environment
In
44th International Conference on Applications of Mathematics in Engineering and Economics AIP
. Vol. 2048., 2018.
Andreev, Evgeni
,
Veselka Radeva
, and
Mariya Nikolova
.
Innovative Biomonitoring Systems in The Aerospace Industry
In
CEMA’19 conference
. Sofia, 2019.
Clarke, Justin
.
SQL Injection Attacks and Defense
. USA: Syngress, 2012.
Conroy, M.
.
Design and Development with Very Distributed Teams
., 2018.
Dietzler, Dave
.
"
Making it on the Moon: Bootstrapping Lunar Industry
."
The NSS Space Settlement Journal
1 (2016).
Isbell, Douglas
, and
David Morse
.
Latest lunar prospector findings indicate larger amounts of polar water ice
In
LRC Publications
., 2005.
Dunkin, Sarah
, and
David Heather
.
New views of the Moon
. Physics Web, 2005.
Pages
« първа
‹ предишна
…
438
439
440
441
442
443
444
445
446
…
следваща ›
последна »
469900 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all