Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Fernández-Caramés, Tiago M.
, and
Paula Fraga-Lamas
.
"
Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases
."
Sensors
20, no. 11 (2020): 3048.
Rahouti, Mohamed
.
"
Board 128: Understanding Global Environment for Network Innovations (GENI) and Software-defined Networking (SDN) for Computer Networking and Security Education
." In
2019 ASEE Annual Conference & Exposition
. Tampa, Florida, 2019.
van der Velde, Dennis
,
Martin Henze
,
Philipp Kathmann
,
Erik Wassermann
,
Michael Andres
,
Detert Bracht
,
Raphael Ernst
,
George Hallak
,
Benedikt Klaer
,
Philipp Linnartz
et al.
"
Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
."
arXiv:2003.06185 [
(2020).
Rahouti, Mohamed
, and
Kaiqi Xiong
.
A Customized Educational Booster for Online Students in Cybersecurity Education. M Rahouti, K Xiong - CSEDU (2), 2019
In
Proceedings of the 11th International Conference on Computer Supported Education (CSEDU 2019)
., 2019.
Hurst, W.
,
N. Shone
,
Q. Shi
, and
B. Bazli
.
"
MICRO-CI: A Testbed for Cyber-Security Research
." In
EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence
., 2016.
Hurst, W.
,
N. Shone
,
Q. Shi
, and
B. Bazli
.
"
Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research
."
International Journal On Advances in Security
10, no. 1&2 (2017): 114-125.
Suryotrisongko, Hatma
, and
Yasuo Musashi
.
"
Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective
." In
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)
. Kaohsiung, Taiwan, 2019.
Easttom, Chuck
.
Incorporating Cybersecurity Engineering Within The Discipline Of Systems Engineerin
. Vol. Master of Science. University of Texas at El Paso, 2019.
Prvan, Marina
, and
Julije Ožegovć
.
"
Methods in Teaching Computer Networks: A Literature Review
."
ACM Transactions on Computing Education
20, no. 3 (2020).
Maahs, Doreen Lynn
.
Managerial Strategies Small Businesses Use to Prevent Cybercrime
. Vol. Doctor of Business Administration (D.B.A.). Walden University, 2018.
Burrell, Darrell Norman
,
Ashley Dattola
,
Maurice E. Dawson
, and
Calvin Noble
.
"
A Practical Exploration of Cybersecurity Faculty Development With Microteaching
."
International Journal of Applied Management Theory and Research (IJAMTR)
1, no. 1 (2019).
Hurst, William
,
Fosso Wamba Samuel
,
Huang Jen-Fa
, and
Wen-Piao Lin
.
"
Micro-CI: A Critical Systems Testbed for Cyber-Security Research
." In
EMERGING 2016
., 2016.
Beveridge, Robert
.
"
Effectiveness of Increasing Realism Into Cybersecurity Training
."
International Journal of Cyber Research and Education (IJCRE)
2, no. 1 (2020).
Sánchez, Julia
,
Adrià Mallorqui
,
Alan Briones
,
Agustín Zaballos
, and
Guiomar Corral
.
"
An Integral Pedagogical Strategy for Teaching and Learning IoT Cybersecurity
."
Sensors
20, no. 14 (2020): 3970.
Randall, Gerald
.
Factors Influencing Adoption of Laboratory Virtualization for College and University Cybersecurity Degree Programs: A Correlational Study
. Capella University, 2020.
Yang, Xin-She
, and
Xing-Shi He
.
Nature-Inspired Computation in Data Mining and Machine Learning
In
Studies in Computational Intelligence
. Vol. 855., 2020.
Stines, Alan
.
Faculty Perceptions of Open Educational Resources in Cyber Curriculum: A Pilot Study
In
Business and Information Systems
. Vol. Doctor of Philosophy (PhD). Dakota State University, 2020.
Alloghani, Mohamed
,
Dhiya Al-Jumeily
,
Abir Hussain
,
Jamila Mustafina
,
Thar Baker
, and
Ahmed J. Aljaaf
.
"
Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities
." In
Nature-Inspired Computation in Data Mining and Machine Learning
. Springer Natur, 2020.
Ahmed, Ali
,
Karsten Lundqvist
,
Craig Watterson
, and
Nilufar Baghaei
.
"
Teaching Cyber-Security for Distance Learners: A Reflective Study
." In
2020 IEEE Frontiers in Education Conference (FIE)
. Uppsala, Sweden, 2020.
Trent, Amir
.
Developing cyber security competences using NICE KSAs in cyber ranges
In
university cyber security program
. Vol. Bachelor's thesis., 2020.
Alkhaldi, Hebah Nassar
.
"
Legal Challenges of E-commerce in Kuwait during the COVID-19 Pandemic
."
Kilaw Journal - Special Supplement
8, no. 6 (2020).
Rusomanov, Vase
, and
Biljana Bogdanova Smilevska
.
Indicators and Process of Radicalization
In
Proceedings of the International Scientific Conference "Social Changes in the Global World"
. Vol. 1., 2018.
Wirtz, Bernd W.
, and
Jan C. Weyerer
.
"
Künstliche Intelligenz im öffentlichen Sektor: Anwendungen und Herausforderungen
."
VM Verwaltung & Management
25, no. 1 (2019): 37-44.
Калоянова, Калинка
, and
Андрей Антонов
.
"
Приложение на итеративни принципи и обектно-ориентиран подход при разработката на образователен софтуер
." In
Национална конференция по информатика, посветена на 80 г. от рождението на професор Петър Бърнев
. София, България, 2016.
Phillips, Ira Johnson
.
Maintaining Small Retail Business Profitability by Reducing Cyberattacks
In
School Business Administration
. Vol. Doctor of Business Administration (D.B.A.). Walden University, 2020.
Pages
« първа
‹ предишна
…
472
473
474
475
476
477
478
479
480
…
следваща ›
последна »
469441 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all