Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Khrapunova, Leyla
.
Nazarbayev’s main scenario is to pass power to his son
. Ablyazov.org, 2014.
Kazakhstan after … Kazakhstan without Nazarbayev: the moment of truth
. Central Asia Monitor, 2014.
"
Kazakhstan and Uzbekistan: Intimations of mortality. Two of Central Asia’s strongmen and their daughters ponder succession
."
The Economist
(2013).
Vielmini, Fabrissi
.
It turns out that Kazakhstan is unstable
. inoСМИ.ru, 2012.
Georgiev, Venelin
.
Levels of Cybersecurity Training and Education
In
IT4Sec Reports
. Sofia: Institute of Information and Communication Technologies, 2015.
M., Alfawas S.
.
Information Security Management: a case study of an information security culture
. Queensland University of technology, 2011.
D., Majers
.
Социалная психология
., 1997.
Ratchev, Valeri
.
Bulgaria’s 2014 Annual Defence Report: Plenty of Data, Low Political Impact
In
CSDM Views
. Sofia: Centre for Security and Defence Management, 2015.
"
Ангел Найденов: Състоянието на армията е много лошо
."
Standart
(2013).
Доклад за състоянието на отбраната и въоръжените сили на Република България
. Министерски съвет на Република България, 2015.
Gertz, Bill
.
"
Inside the Ring: Cybercom’s Michael Rogers confirms Russia conducted cyber-attacks against Ukraine
."
The Washington Times
(2014).
Jones, Sam
.
"
Ukraine PM’s office hit by cyber attack linked to Russia
."
Financial Times
(2014).
Dubov, Dmytro V.
.
"
Strategic Aspects of Ukrainian Cybersecurity
."
The Strategy Priorities
29, no. 4 (2013): 119-126.
Cybersecurity strategy of Ukraine
In
draft
., 2014.
On the Action Plan for the protection of state information resources
In
Order of the Cabinet of Ministers of Ukraine
. Kyiv, 2014.
On the basic principles to ensure cybersecurity of Ukraine
In
Law of Ukraine
., 2013.
Korneyko, Oleksandr
.
State Service of Special Communication and Information Protection of Ukraine – a key factor in the protection of public electronic information resources in Ukrainian cyberspace
In
Cybersecurty-2013
. Yalta: Presentation at international conference, 2014.
Website of the Ministry of the Interior of Ukraine
., 2014.
Dubov, Dmytro V.
, and
Mykola A. Ozgevan
.
Cybersecurity: the World Tendencies and Challenge for Ukraine
. NІSR, 2011.
List of public higher education institutions licensed in the areas of 1601, 1701 in the field of knowledge “Information Security“
., 2014.
Standards of higher education 1701 “Information Security“
.
Passport of specialty 05.13.21 System of Information Security
., 2014.
Passport of specialty 21.05 Information security of the state
., 2014.
Tagarev, Todor
.
Key Prerequisites for Integrity in Defence - Role of Parliament
In
CSDM Views
. Sofia: Centre for Security and Defence Management, 2015.
R. Nation, Craig
.
"
Russia and the Caucasus
."
Connections: The Quarterly Journal
14, no. 2 (2015): 1-11.
Pages
« първа
‹ предишна
…
71
72
73
74
75
76
77
78
79
…
следваща ›
последна »
469483 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all