Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Shires, James
.
The Politics of Cybersecurity in the Middle East
., 2021.
Li, Yanan
.
"
Application of Intelligent Sensor Algorithm in Student Management Information Fusion
."
Scientific Programming and Artificial Intelligence for Sensor Data Stream Analysis
(2021).
Staupe-Delgado, Reidar
,
DinaAbdel -Fattah
, and
Christer Pursiainen
.
"
A discipline without a name? Contrasting three fields dealing with hazards and disaster Author links
."
International Journal of Disaster Risk Reduction
70, no. 15 (2022).
Ladera, Luis Guillermo
.
Adopción del Planeamiento Basado en Capacidades en el Personal del Grupo de Artillería de Campaña
. Vol. Profesional de Licenciado en Ciencias Militares con mención en Ingenierí. Lima, Perú: Escuela Militar de Chorrillos, 2021.
Hilal, Waleed
,
Andrew S. Gadsden
, and
John Yawney
.
"
Financial Fraud: A Review of Anomaly Detection Techniques and Recent Advances
."
Expert Systems with Applications
193 (2022).
Žilinskas, Remigijus
, and
Leonidas Sakalauskas
.
"
Exploring crisis governance: Quest for functional resilience during COVID-19 in Lithuania
."
Scientific Journal of the Military University of Land Forces
53, no. 4 (2021): 763-798.
Perwira, Reza
.
"
Collaborative Governance dalam Penilaian Buku Pendidikan Agama di Kementerian Agama
."
Konferensi Nasional Ilmu Administrasi
5, no. 1 (2021).
Mygal, Galyna V.
,
Valeriy P. Mygal
, and
Olga F. Protasenko
.
"
Multidisciplinary approach to research and analysis of the safety of complex transport systems
." In
4-th International Scientific and Practical Conference ISM–2021
. Kharkiv, Ukraine, 2021.
Hasan, Mohammad Kamrul
,
Ali Alkhalifah
,
Shayla Islam
,
Nissrein B. M. Babiker
,
A. K. M. Ahas Habib
,
Azana Hafizah Mo Aman
, and
Arif Hossain
.
"
Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations
."
Metaheuristic Algorithms for Big Data Analytics within the Internet of Things
2020 (2020).
Protasenko, Olga
, and
Galina Mygal
.
"
Human Factors: the Problem of Man-Machine Interaction Under the Digiltalization Conditions
."
Scientific Journal of Polonia University
48, no. 5 (2021).
Dezert, Jean
, and
Albena Tchamova
.
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
In
Information & Security: An International Journal
. Vol. 52., 2022.
Dezert, Jean
, and
Albena Tchamova
.
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
In
Information & Security: An International Journal
. Vol. 52., 2022.
Ramakrishnan, Karthik
,
P Gokul
, and
Rohan Nigam
.
Pandora: An IOT based Intrusion Detection Honeypot with Real-time Monitoring
In
2021 International Conference on Forensics, Analytics, Big Data, Security (FABS)
. Bengaluru, India, 2021.
Oussous, Ahmed
, and
Fatima Zahra Benjelloun
.
"
A Comparative Study of Different Search and Indexing Tools for Big Data
."
Jordanian Journal of Computers and Information Technology (JJCIT)
(2021).
Juma, Mazen Ghazi
.
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
. Vol. Doctor of philosophy in computer science. The British University in Dubai, 2021.
Lawson, Sean
.
"
Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History
."
Working Paper
11, no. 01 (2011).
Room, C.
.
PBX Hacking
In
DEVOPEDIA ® for developers
., 2022.
Wirawan, Deny
,
Budi Pramono
, and
Triyoga Budi Prasetyo
.
"
Defense Diplomacy Strategy in Handling Transnational Crimes at the Sea Borders of Indonesia – Malaysia – Filipina
."
International Journal of Social Science And Human Research
05, no. 02 (2022).
Utakrit, Nathaporn
.
"
Overlapping Concept to Action Between Information Assurance and Information Security
."
Information Technology Journal
(2021).
Lande, Dmytro
.
Метод побудови дайджесту, що базується на дискримінантній вазі опорних слів
., 2021.
Herath, Thilini B. G.
,
Prashant Khanna
, and
Monjur Ahmed
.
"
Cybersecurity Practices for Social Media Users: A Systematic Literature Review
."
Journal of Cybersecurity and Privacy
2 (2022): 1-18.
Jusufi, Islam
.
"
Uncertainty, fragmentation, and international obligations as shaping influences: Cyber security policy development in Albania
." In
Cyber Security Politics
., 2022.
Zarate, Marcus
.
Technology Acceptance for Protecting Healthcare Data in the Presence of Rising Secure Sockets Layer/Transport Layer Security Communications: A Generic Qualitative Inquiry
. Capella University, 2021.
Vinodha, K.
,
Vaishali M. Deshmukh
, and
Subhashree Rath
.
Secured Online Learning in COVID-19 Pandemic using Deep Learning Methods
In
2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC)
. Tumkur, Karnataka, India, 2021.
Bridge, James
.
A Quantitative Study of the Relationship of Data Quality Dimensions and User Satisfaction with Cyber Threat Intelligence
. Capella University, 2022.
Pages
« първа
‹ предишна
…
500
501
502
503
504
505
506
507
508
…
следваща ›
последна »
469347 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all