Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Smith, Shirley Denise
.
Strategies to Reduce the Fiscal Impact of Cyberattacks
In
School Business Administration
. Vol. Doctor of Business Administration (D.B.A.) . Walden University, 2019.
Romero, Lyndell D.
.
Security Architecture Components Cybersecurity Specialists Need to Establish a Limited-Budget Cybersecurity Program: A Qualitative Study
. Colorado Technical University, 2020.
Rakonić, Isabella
.
Kaznenopravni aspekti kibernetičkog ratovanja
In
Pravni fakultet
. Zagreb: Sveučilište u Zagrebu, 2019.
Lal, Bechoo
.
"
Case Study: Attacks and Defence Modelling Approach for Cyber Security
."
International Journal of Business Management and Administration (IJBMA)
1, no. 1 (2020).
Tanui, David J.
.
Counter-Terrorism Financing: The Case of the Islamic State (ISIS)
. Vol. Doctor of Science. New Jersey City University, 2020.
Obtinario, Olivia Bolinas
, and
Kari Marie Thorkildsen
.
"
Asylum seekers’ lived experiences of dignity during health examination: A phenomenological hermeneutical study
."
Nordic Journal of Nursing Research
(2020).
Baris, Hanifi
.
Beyond Multiculturalism, Away from State-Oriented Nationalism: Self-rule through Residential Political Communities in Kurdistan
In
Civil Society and Rule of Law
. Vol. Doctor of Philosophy at Centre for Citizenship. University of Aberdeen, 2017.
Baris, Hanifi
.
The Kurdish Model of Political Community: A Vision of National Liberation Defiant of the Nation-state
. Rowman & Littlefield, 2020.
Saridal, Lemi Caner
.
Kurdish Political Identity within the Realm of Turkish Politics and Kemalism
In
Department of Social and Welfare Studies
. Vol. Master. Linköping University, 2019.
Duzcu, Murad
.
The Tragedy of Youth in Conflict and Post-Conflict Settings: Preventing Youth Participation in Violence and Assessing Their Role in Turkey’s Southeast (2009-2015)
. Vol. PhD Thesis. Coventry: Coventry University, 2016.
KOLÇAK, Hakan
.
"
TURKEY: The Kurdish Issue. Limits of Security Methods
."
Conϐlict Studies Quarterly
29 (2019): 28-42.
Romaniuk, Scott N.
, and
Mary Manjikian
.
Routledge Companion to Global Cyber-Security Strategy
. 1st ed. Routledge, 2021.
Autiosalo, Juuso
,
Jari Vepsäläinen
,
Raine Viitala
, and
Kari Tammi
.
"
A Feature-Based Framework for Structuring Industrial Digital Twins
."
IEEE Access
8 (2019).
McKenzi, Francine
.
Visualizing Canada's Future in the Fifth Dimension
. University of Western Ontario, 2019.
Ounda, Daniel
.
Examining the Role of Security Operations Centres (SOCs) in the Age of Cybercrime
. Kenya Engineer, 2020.
Dóra, Molnár
.
Törékeny Nagyhatalmiság: A Kiberbiztonság. Az Európai Kibertér Brit, Német És Francia Szegmensei
. Budapest: Nemzeti Közszolgálati Egyetem , 2020.
Haddad, Said
.
Building a (French) National Priority: The Grammar of the French Cyber Defence Strategy
In
ECCWS 2019 18th European Conference on Cyber Warfare and Security
., 2019.
Cannon, Jennifer Elizabeth
.
Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks
In
Management
. Vol. Doctor of Business Administration (D.B.A.) . Walden University, 2019.
Moore, Barbara N.
.
Cyber Threats in e-Government
. Vol. Doctor of business administration. Northcentral University, 2018.
Renaud, Karen
,
Craig Orgeron
,
Merrill Warkentin
, and
Edward P. French
.
"
Cyber Security Responsibilization: An Evaluation of the Intervention Approaches Adopted by the Five Eyes Countries and China
."
Public Administration Review
80, no. 4 (2020).
Rono, EK
.
Adoption of Computer Use by Police in Crime Management in Nairobi City County Kenya
., 2020.
McKenna, Matthew A.
.
Deficiencies in Electoral Security: Outcomes of the 2007 and 2013 Kenyan Elections
. Vol. Master's thesis. Harvard Extension School, 2019.
Kurebwa, Jeffrey
, and
Eunice Magumise
.
"
The Effectiveness of Cyber Security Frameworks in Combating Terrorism in Zimbabwe
."
International Journal of Cyber Research and Education (IJCRE)
2, no. 1 (2020).
Bada, Maria
,
Basie von Solms
, and
Ioannis Agrafiotis
.
"
Reviewing National Cybersecurity Awareness for Users and Executives in Africa
."
arXiv:1910.01005
12, no. 1-2 (2019).
Lynet, Kosgey
,
Chao Mbogo
, and
Nyaga Mwaniki
.
"
A Digital Storytelling Model for Increasing Information Security Awareness among Kenyan Smartphone Users
."
International Journal of Professional Practice
8, no. 1 (2020).
Pages
« първа
‹ предишна
…
473
474
475
476
477
478
479
480
481
…
следваща ›
последна »
469832 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all