Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Hybrid CoE, (The European Centre of Excellence for Countering Hybrid Threats)
., 2018.
Joint declaration by the President of the European Council, the President of the European Commission, and the Secretary General of the North Atlantic Treaty Organization
., 2017.
Young, Thomas-Durell
.
"
Can NATO's ‘new’ allies and key partners exercise national-level command in crisis and war?
"
Comparative Strategy
37, no. 1 (2018): 9-21.
Onyshhenko, Oleksiy S.
,
Valeruy M. Gorovyj
, and
Volodymyr I. Popyk
.
Socialni merezhi jak instrument vzajemovplyvu vlady ta gromadjanskogo suspilstva
. Kyiv: Natsionalna biblioteka Ukrainy im. V. I. Vernadskoho, 2014.
Obar, Jonathan A.
, and
Steven Wildman
.
"
Social media definition and the governance challenge: An introduction to the special issue
."
Telecommunications policy
39 (2015): 745-750.
Boyd, Danah M.
, and
Nicole B. Ellison
.
"
Social Network Sites: Definition, History, and Scholarship
."
Journal of computer-mediated communication
13, no. 1 (2007): 210-230.
Danyk, Juriy
,
Ruslan V. Hryshchuk
, and
Oleksiy Samchyshyn
.
"
Mobilni socialni Internet-servisy jak odyn iz riznovydiv masovoi komunikacii na suchasnomu etapi
."
Bezpeka informacii
21, no. 1 (2015): 16-20.
Molodetska, Kateryna
.
"
Socialni internet-servisy jak subjekt informacijnoi bezpeky derzhavy
."
Information Technology and Security
1, no. 6 (2016): 13-20.
Hryshchuk, Ruslan V.
, and
Juriy H. Danyk
.
Osnovy kibernetychnoi' bezpeky. Monografija
. Zhytomyr: ZhNAEU, 2016.
Holloway, Michael
.
How Russia Weaponized Social Media in Crimea
. Realcleardefense.com, 2017.
Hryshchuk, Ruslan V.
.
Teoretychni osnovy modeljuvannja procesiv napadu na informaciju metodamy teorij dyferencialnyh igor ta dyferencialnyh peretvoren
. Zhytomyr: Ruta, 2010.
Burjachok, Volodymyr L.
,
Ruslan V. Hryshchuk
, and
Volodymyr O. Horoshko
.
Polityka informacijnoi bezpeky
. Kyiv: PVP “Zadruga”, , 2015.
Petryk, Volodymyr M.
,
Mykola M. Prysjazhnjuk
, and
Dmytro S. Melnyk
.
Zabezpechennja informacijnoi bezpeky derzhavy
. Kyiv: DPU “Knyzhkova palata Ukrainy”, 2015.
Zernecka, Olga
.
UA Foreign Affairs: Evoljucija strategij kiberbezpeky SShA
. Uaforeignaffairs.com, 2015.
Ukaz Prezydenta Ukrainy № 47/2017. Doktryna informacijnoi bezpeky Ukrainy
. Oficijne predstavnyctvo Prezydenta Ukrainy, 2017.
Radkovec, Juriy
,
Oleksandr Levchenko
, and
Oleksiy Kosogov
.
"
Pogljady na stvorennja systemy informacijnoi bezpeky Ukrainy ta ii Zbrojnyh Syl
."
Nauka i oborona
1 (2014): 38-42.
Malyk, Jaroslav
.
"
Informacijna bezpeka Ukrainy: stan ta perspektyvy rozvytku
."
Efektyvnist derzhavnogo upravlinnja
44 (2015): 13-20.
Perry, Bret
.
"
Non-Linear Warfare in Ukraine: The Critical Role of Information Operations and Special Operations
."
Small Wars Journal
11, no. 1 (2017).
Zhdanova, Mariia
, and
Dariya Orlova
.
Computational Propaganda in Ukraine: Caught between external threats and internal challenges
In
Working Paper 2017.9
. Oxford, UK: Project on Computational Propaganda, 2017.
Molodetska, Kateryna
.
"
Uzagalnena klasyfikacija zagroz informacijnij bezpeci derzhavy v socialnyh internet-servisah
."
Zashhyta ynformacyy: sb. nauch. trud. NAU
23 (2016): 75-87.
Chernyshuk, Sergiy V.
.
"
Metodyka vyjavlennja kibernetychnyh zagroz u pryrodnomovnyh tekstah
."
Problemy stvorennja, vyprobuvannja, zastosuvannja ta ekspluatacii skladnyh informacijnyh system
8 (2013): 112-121.
Molodetska-Hrynchuk, Kateryna
.
"
Metod vyjavlennja oznak informacijnyh vplyviv u socialnyh internet-servisah za zmistovnymy oznakamy
."
Radioelektronika, informatyka, upravlinnja
2, no. 41 (2017): 117-126.
Theocharis, Yannis
,
Will Lowe
,
Jan W. van Deth
, and
Gema García-Albacete
.
"
Using Twitter to mobilize protest action: Online mobilization patterns and action repertoires in the Occupy Wall Street, Indignados, and Aganaktismenoi movements
."
Information, Communication & Society
18, no. 2 (2015): 202-220.
Zharkov, Jaroslav M.
,
Volodymyr M. Petryk
,
Mykola M. Prysjazhnjuk
,
Jevhen D. Skulysh
, and
Larysa F. Kompanceva
.
Informacijno-psyhologichne protyborstvo (evoljucija ta suchasnist): monografija
. Kyiv: Vipol, 2013.
Pennacchiotti, Marco
, and
Ana-Maria Popescu
.
Democrats, republicans and Starbucks afficionados: user classification in Twitter
In
17th ACM SIGKDD international conference on Knowledge discovery and data mining
., 2011.
Pages
« първа
‹ предишна
…
284
285
286
287
288
289
290
291
292
…
следваща ›
последна »
480974 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all