Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Vermaut, Vincent
.
De economische effecten van piraterij in Zuidoost-Azië
. Vol. Master in de Maritieme Wetenschappen. Universiteit Antwerpen – Faculteit Toegepaste Economische Wetenschappen, Universiteit Gent – Faculteit Rechtsgeleerdheid, 2014.
Bossong, Raphael
, and
Hendrik Hegemann
.
"
Die Politik der zivilen Sicherheit: Bedeutungen und Wirkungen eines aufstrebenden Begriffs
."
Zeitschrift für Außen- und Sicherheitspolitik
10, no. 1 (2017): 39-65.
Zayed, Khaled
.
"
Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device
."
Int. J. Teaching and Case Studies
7, no. 3/4.
de Ávila, Rafael Oliveira
, and
Rafael Pinto da Silva
.
"
Brasil informacional: a seguranca cibernética como desafio à seguranca nacional
." In
Encontro nacional de pesquisa em ciencia da informacao
., 2011.
Choucri, Nazli
,
Chrisma Jackson
,
Lyla Fischer
,
Brooke Gier
,
Vivian Peron
,
Ben Ze Yuan
,
Liu Yangyue
, and
Glenn Voelz
.
Perspectives!on!Cybersecurity:!! A!Collaborative!Study!
In
Research Paper
. Massachusetts Institute of Technology, Political!Science!Department!, 2015.
Lubiano, María Asunción
,
Antonia Salas
, and
María Ángeles Gil
.
"
A hypothesis testing-based discussion on the sensitivity of means of fuzzy data with respect to data shape
."
Fuzzy Sets and Systems
328 (2017): 54-69.
Värnqvist, P
.
Reflexiv kontroll: evig metod som systematiserats?
In
Självständigt arbete krigsvetenskap
., 2016.
Ibraheem, Basem
,
Abeer Hamdy
, and
Nevien Darwish
.
"
Textual Signs Reading for Indoor Semantic Map Construction
."
International Journal of Computer Applications (0975 – 8887)
53, no. 10 (2012).
Shao-hua, Jiang
, and
Tang Wen-sheng
.
"
A Multi-source Image Fusion Framework Supporting Parameters Optimization
."
Computer Engineering
39, no. 10 (2013).
Khodabandeh, M.
, and
A. Mohammad-Shahri
.
"
Measurement Uncertainty evaluation for an ultrasonic data fusion based target differentiation problem using Generalized Aggregated Uncertainty measure 2
."
Measurement
59 (2015): 139-144.
Mohammad, Nur
,
Xingming Sun
, and
Hengfu Yang
.
"
An Adaptive Visible Watermarking Algorithm for BTC Compressed Images
."
Information Technology Journal
13, no. 3 (2014): 536-541.
Pratap, Inder
,
Saroj Hiranwal
, and
N. S. Yadav
.
"
A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC
."
International Journal of Computer Applications
83, no. 6 (2013): 44-48.
Lubis, Fetty Fitiyanti
.
Teknik Video Digital Watermarking sebagai Proteksi Hak Cipta pada Distribusi Konten Multimedia
In
Desain Komunikasi Visual, Fakultas Industri Kreatif
. Universitas Telkom, 2008.
Manaf, A.A.
,
Ali Boroujerdizade
, and
Seyed Mojtaba Mousavi
.
"
Collusion-Resistant digital video watermarking for copyright protection application
."
International Journal of Applied Engineering Research
11, no. 5 (2016): 3484-3495.
Hansel, Mischa
.
"
Cyber-attacks and psychological IR perspectives: explaining misperceptions and escalation risks
."
Journal of International Relations and Development
21, no. 3 (2018): 523-551.
New York Declaration for Refugees and Migrants
. UN General Assembly, 2016.
Deliso, Christopher
.
Migration, Terrorism and the Future of a Divided Europe: A Continent Transformed
. Santa Barbara, CA: Praeger Security International, 2017.
Parkes, Roderick
.
Nobody Move! Myths of the EU Migration Crisis
In
Chaillot Papers
. Paris: EU Institute for Security Studies, 2017.
Tchamova, Albena
,
Tzvetan Semerdjiev
,
Pavlina Konstantinova
, and
Jean Dezert
.
Generalized Data Association for Multitarget Tracking in Clutter
In
Collected works, vol. 1
. American Research Press, Rehoboth, 2004.
Bojilov, Ljudmil
, and
Pavlina Konstantinova
.
A Comparison study of two approaches for determining ranked set of assignments for multitarget tracking
., 2017.
Shafi, Kamran
, and
David Oliver
.
"
Historical Operational Data Analysis for Defence Preparedness Planning
."
Journal of Defense Modeling & Simulation
15, no. 2 (2016).
Adlakh, Mona
.
"
Mobile Commerce Security and Its Prevention
." In
Securing Transactions and Payment Systems for M-Commerce
. IGI Global, 2016.
Benoudnine, Hadjira
,
Abdelkrim Meche
,
Mokhtar Keche
,
Abdelaziz Ouamri
, and
Malcolm S. Woolfson
.
"
Real time Hough transform based track initiators in clutter
."
Information Sciences
337–338 (2016): 82-92.
Mirzaei, Majid
,
Mina Faghih
,
Tan Pei Ying
,
Ahmed El-Shafie
,
Yuk Feng Huang
, and
Juneseok Lee
.
"
Application of a rainfall-runoff model for regional-scale flood inundation mapping for the Langat River Basin
."
Water Practice and Technology
11, no. 2 (2016): 373-383.
Hofmann, Marko A.
.
Reasoning beyond predictive validity: the role of plausibility in decision-supporting social simulation
In
WSC '15 Proceedings of the 2015 Winter Simulation Conference
. Huntington Beach, California, 2015.
Pages
« първа
‹ предишна
…
305
306
307
308
309
310
311
312
313
…
следваща ›
последна »
481036 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all