Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Ghahfarokhi, Anahita Farhang
,
Taha Mansouri
,
Mohammad Reza Sadeg Moghaddam
,
Nila Bahrambeik
,
Ramin Yavari
, and
Mohammadreza Fani Sani
.
"
Credit card fraud detection using asexual reproduction optimization
."
Kybernetes
(2021).
Mashiane, Thulani
, and
Elmarie Kritzinger
.
"
Identifying behavioral constructs in relation to user cybersecurity behavior
."
Eurasian Journal of Social Sciences
, no. 2 (2021): 98-122.
Rajamäki, Jyri
, and
Harri Ruoslahti
.
"
ECHO Federated Cyber Range as a Tool for Validating SHAPES Services
." In
European Conference on Cyber Warfare and Security
., 2021.
Hidalgo, Steve
.
Implementing Cybersecurity Measures in New Information Technology Systems: A Generic Qualitative Inquiry
. Vol. Doctor of Information Technology. Hidalgo, Steve. Capella University, ProQuest Dissertations Publishing, 2021.
Ahmed, Mansoor
,
Kainat Ansar
,
Cal B. Muckley
,
Abid Khan
,
Adeel Anjum
, and
Muhammad Talha
.
"
A semantic rule based digital fraud detection
."
PeerJ Computer Science
(2021).
Hu, Shaoyong
,
Jiang Wang
,
Yuchen Wang
, and
Song Tian
.
"
Stability Limits for the Velocity Orientation Autopilot of Rolling Missiles
."
IEEE Access
9 (2021).
Huang, Juanjuan
.
"
Information Dissemination Control Algorithm of Ecological Changes in the New Media Communication Environment
."
Mobile Information Systems
2021 (2021).
Paladin, Zdravko
,
Andrej Mihailović
,
Nexhat Kapidani
,
David Merino Delgado
,
Juan Manuel Gre Nogueron
,
Giuseppe Vella
,
Marios Moutzouris
, and
Roberto Leuzzi
.
"
Augmenting maritime Command and Control over a regional Common Information Sharing Environment implementation: Montenegro Case
."
NMIOTC Journal
22 (2021): 20-29.
Díaz, Claudia Forte
.
La gobernanza de las migraciones en la Unión Europea: Un análisis de la propuesta del Nuevo Pacto Europeo sobre Migración y Asilo desde una perspectiva de derechos humanos
In
Instituto de Derechos Humanos “Gregorio Peces-Barba”
. Vol. Máster., 2021.
Deng, Xinyang
, and
Yebi C. U. I. Wen Jiang
.
"
An ECR-PCR rule for fusion of evidences defined on a non-exclusive framework of discernment
."
Chinese Journal of Aeronautics
(2021).
Tomura, Nozomi
,
Saki Uehara
,
Konosuke Kaneta
,
Ryosuke Hara
,
Ryogo Sasaki
,
Maho Tsuchida
,
Ayu Shibuya
, and
Maiko Yamashita
.
"
Construction of The E-Government -Case Study of Japan and Estonia
."
International Journal for Applied Information Management
1, no. 3 (2021): 145-151.
Skillicorn, David B.
.
Cyberspace, Data Analytics, and Policing
. Taylor & Francis Group, 2021.
Vuletic, Dejan
, and
Branislav Đorđević
.
"
Problemi i izazovi upravljanja internetom na međunarodnom nivou
."
Medjunarodni problemi
LXXIII, no. 2 (2021): 235-258.
Sharkov, George
,
Christina Todorova
,
Georgi Koykov
, and
Georgi Zahariev
.
Hybrid Exercising for Cyber-Resilient Healthcare and Cross-Sector Crisis Response Operability
In
Information Systems and Grid Technologies ISTG, CEUR Workshop Proceedings
. Vol. 933., 2021.
Raub, Allen Edward
.
Information Technology Service Continuity Practices in Disadvantaged Business Enterprises
In
College of Management and Technology
. Walden University , 2021.
Herath, Thilini Bhagya Got
.
The recommended cybersecurity practices for Facebook users from users’ point of view
In
Research Project– INFO901
. Centre for Information Technology, 2021.
Apostolidis, Kyriakos D.
, and
George A. Papakostas
.
"
A Survey on Adversarial Deep Learning Robustness in Medical Image Analysis
."
Electronics
10, no. 2132 (2021).
Zhou, Ya
, and
Xiaobo Jiao
.
"
Intelligent analysis system for signal processing tasks based on LSTM recurrent neural network algorithm
."
Neural Computing and Applications
(2021).
Mùrino, G
,
M Ribaudo
,
SP Romano
, and
A Tacchella
.
"
OT Cyber Security Frameworks Comparison Tool (CSFCTool)
." In
ITASEC’21, Italian Conference on Cybersecurity,
., 2021.
Ivanov, Svetoslav
, and
Pavel Petrov
.
"
Development of Software Systems by Using Interaction Business Scenarios
." In
10th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE– 2020)
. Sofia,Bulgaria: University of National and World Economy , 2020.
Petrov, Pavel
, and
Svetoslav Ivanov
.
"
Nature and Main Features of Technology Startups
." In
10th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE– 2020)
. Sofia,Bulgaria: University of National and World Economy , 2020.
Mateeva, Gergana
,
Dimitar Parvanov
, and
Todor Balabanov
.
"
Differential Evolution and Particle Swarm Optimization Efficiency According to Pseudo-Random Number Generator Quality
."
Problems of Engineering Cybernetics and Robotics
76: 39-46.
Fadli, Muhammad Hanifudin
,
Dadang Gunawan
,
Romie Oktovianus Bura
, and
Larasmoyo Nugroho
.
"
Design and Implementation of Anti-Tank Guided-Missile (ATGM) Control System Using Semi-Automatic Command Line of Sight (SACLOS) Method Based on Digital Image Processing
."
Jurnal Pertahanan
7, no. 2 (2021).
Amankwa, Eric
.
"
Relevance of Cybersecurity Education at Pedagogy Levels in Schools
."
Journal of Information Security
12, no. 4 (2021).
Dimitrova, Zornitsa
,
Daniela Borissova
, and
Vasil Dimitrov
.
"
Design of Web Application with Dynamic Generation of Forms for Group Decision-Making
." In
Computer Information Systems and Industrial Management. CISIM 2021
., 2021.
Pages
« първа
‹ предишна
…
495
496
497
498
499
500
501
502
503
…
следваща ›
последна »
469357 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all