Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Hawkins, Timothy G.
,
Wesley S. Randall
,
Adam V. Coyne
, and
Mohammad H. Baitalma
.
"
Sustainable integrity: how reverse auctions can benefit suppliers in emerging markets
."
Supply Chain Management: An International Journal
19, no. 2 (2014): 126-141.
Beaula, Thangaraj
, and
J.Partheeban
.
"
Risk Assessment of Natural Hazards in Nagapattinam District Using Fuzzy Logic Model
."
International Journal of Fuzzy Logic Systems (IJFLS)
3, no. 3 (2013).
Krishna, Varanasi Vamsi
,
Krishna B. Reddy
,
Madhukar R. Vishnu
, and
P Saha
.
"
Disaster Management: Focusing on Earthquakes
."
International Journal of Advance Research, IJOAR
1, no. 3 (2013).
Tripathi, Jay Ganesh
.
"
Distance Learning Courses become more popular in rural areas then urban areas?
"
International Journal of Scientific Research
2, no. 3 (2014): 674-678.
Arisawa, Hiroshi
, and
Takako Sato
.
"
Development of Interactive Multimedia Education System (IMES) as an International Education Platform
." In
ustainable Living with Environmental Risks
. Tokyo : Springer, 2014.
Pohjus, Merja
.
Collaborative Web-Based Course To Learn Military English Vocabulary on the FDFMoodle platform: How can collaboration based on the KATRIKS-model in military pedagogy be integrated into the course?
In
Department of Languages - English
. Vol. Master. University of Jyväskylä , 2014.
Simsek, Mehmet
, and
Pakphum Phairotchananan
.
A comparison of transparency in the defense procurement processes of Turkey and Thailand
. Monterey, California: Naval Postgraduate School, 2014.
Padmadas, M.
,
Krishnan Nallaperumal
,
V. Mualidharan
, and
P. Ravikumar
.
A deployable architecture of Intelligent Transportation System — A developing country perspective
In
IEEE International Conference on Computational Intelligence and Computing Research
. Coimbatore, India : IEEE , 2010.
Babin, Ivan A.
,
Anton Chablin
,
Aleksei Kazantsev
,
Mohammed A. Khesham
,
Yuri V. Vasiliyev
, and
Frederic Labarre
.
"
Countering Radicalism in the North Caucasus
."
Connections: The Quarterly Journal
17, no. 2 (2018): 61-76.
Penev, Plamen P.
.
"
Peacemakers: American Leadership and the End of Genocide in the Balkans (book review)
."
Connections: The Quarterly Journal
17, no. 1 (2018): 77-83.
Bailes, Alyson J. K.
.
"
Societal security and small states
." In
Small States and International Security: Europe and Beyond
. New York: Routledge, 2014.
Najjar, Mohannad
.
"
New Technique to Insure Data Integrity for Archival Files Storage (DIFCS)
."
(IJACSA) International Journal of Advanced Computer Science and Applications
5, no. 2 (2014).
Liu, Yanjun
.
"
A Secure and Efficient t-out-of-n Oblivious Transfer Based on the Generalized Aryabhata Remainder Theorem
."
Journal of Information Hiding and Multimedia Signal Processing
5, no. 2 (2014).
López-García, Lourdes
,
Luis J. Domingu Perez
, and
Francisco Rodríguez-Henríquez
.
"
A Pairing-Based Blind Signature E-Voting Scheme
."
The Computer Journal
57, no. 10 (2014): 1460-1471.
Hsu, Chien-Lung
, and
Yu-Li Lin
.
"
Improved migration for mobile computing in distributed networks
."
Computer Standards & Interfaces
36, no. 3 (2014): 577-584 .
Zakerolhosseini, Ali
, and
Morteza Nikooghadam
.
"
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
."
Wireless Personal Communications
70, no. 2 (2013): 641-656.
Moeller, Robert R.
.
IT Audit, Control, and Security (Wiley Corporate F&A)
. Hoboken, New Jersey: John Wiley and Sons, 2010.
Chim, William
.
"
Russia’s Digital Awakening
."
Connections: The Quarterly Journal
17, no. 2 (2018): 5-17.
Roloff, Ralf
, and
Pàl Dunay
.
"
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank
."
Connections: The Quarterly Journal
17, no. 2 (2018): 19-35.
Flores-Herrera, Albert
, and
Plamen P. Penev
.
"
The importance of the Council of Europe’s 24/7 Network of Contact Points on Foreign Terrorist Fighters
."
Connections: The Quarterly Journal
17, no. 2 (2018): 37-45.
Branch, Anthony R.
.
"
Armenia and the South Caucasus: A New Security Environment
."
Connections: The Quarterly Journal
17, no. 2 (2018): 47-60.
Howcroft, James
.
"
The Future of Terrorism: The Practitioners’ View
."
Connections: The Quarterly Journal
17, no. 2 (2018): 77-81.
Fluri, Philipp
, and
Judith Reid
.
"
The Persistent Demand for Defense Institution Building
."
Connections: The Quarterly Journal
17, no. 3 (2018): 5-7.
Kozieł, Marcin
.
"
NATO’s Defense Institution Building in the Age of Hybrid Warfare
."
Connections: The Quarterly Journal
17, no. 3 (2018): 39-51.
Chinchilla, Alexandra C.
, and
Paul Poast
.
"
Defense Institution Building from Above? Lessons from the Baltic Experience
."
Connections: The Quarterly Journal
17, no. 3 (2018): 61-71.
Pages
« първа
‹ предишна
…
306
307
308
309
310
311
312
313
314
…
следваща ›
последна »
481038 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all