Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Radu, Sintia
.
Old Europe vs. New Tech
. US News & World Report, 2018.
NATO
.
Framework for Future Alliance Operations: 2018 Report
. Allied Command Transformation, 2018.
Thales has welcomed 9 startups within its Cyber@Station F programme
. Thales, 2017.
Vincenti, Daniela
.
Return of the JEDI: European disruptive technology initiative ready to launch
. Euractiv, 2018.
Forum, World Economic
.
Digital Transformation Intiative
In
Executive Summary
., 2017.
Johansen, Iver
, and
Henrik Gråtrud
.
Fra taktisk elite til strategisk tilrettelegger–hvordan Forsvarets spesialstyrker kan møte fremtidens utfordringer
In
FFI-RAPPORT
. Forsvarets forskningsinstitutt (FFI), 2018.
Welsh, Blair
.
Incubators of Terror: Anatomising the Determinants of Domestic Terrorism
. E-International Relations, 2018.
Dimitrios, Sotiriou
.
Conflict Resolution and Interethnic Disputes, the 2001 Crisis in FYROM and the Case of the Ochrid Αgreement
In
Faculty of Social and Political Sciences, Department of Political Studies and International Relations
. Vol. Master Program in «Mediterranean Studies». Corinth: University of Peloponnese, 2018.
Diallo, Saikou Y.
,
Heber Herencia-Zapana
,
Jose J. Padilla
, and
Andreas Tolk
.
Understanding interoperability
In
EAIA '11 Proceedings of the 2011 Emerging M&S Applications in Industry and Academia Symposium
., 2011.
Diallo, Saikou Y.
,
Jose J. Padilla
, and
Andreas Tolk
.
"
Why is Interoperability Bad: Towards a Paradigm Shift in Simulation Composition
." In
Fall Simulation Interoperability Workshop Orlando, FL
. Orlando, FL, 2010.
Diallo, Saikou Y.
, and
Jose J. Padilla
.
"
Handbook of Real-World Applications in Modeling and Simulation
." In
Handbook of Real-World Applications in Modeling and Simulation
. John Wiley & Sons, 2012.
Alghamdi, Abdullah S.
,
Syed Amanullah Quadri
,
Iftikhar Ahmad
, and
Khalid Al-Nafjan
.
"
A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems
." In
Security Technology, Disaster Recovery and Business Continuity
, 244-249. Berlin Heidelberg: Springer-Verlag, 2010.
Alghamdi, Abdullah Sharaf
,
Tazar Hussain
,
Gul Faraz Khan
,
Khalid Alnafjan
, and
Abdul Haseeb
.
"
Proposed methodology to enhance C4I systems security on architectural level
."
Scientific Research and Essays
6, no. 29 (2011): 6095-6103.
Ben van der Merwe, Pieter
.
Mobile commerce over GSM: A banking perspective on security
In
Faculty of Engineering
. Vol. Master of Science (Electronics). University of Pretoria, 2003.
Tselkov, Veselin
, and
Nikolai Stoianov
.
A Model of Software Cryptography System for Data Protection in Distribution Information Systems
., 2018.
Stoianov, Nikolai Todorov
, and
Veselin Tsenov Tselkov
.
E-Net Models of a Software System for E-Mail Security
In
Computer Science, Cryptography and Security
., 2010.
Stoianov, Nikolai Todorov
, and
Veselin Tsenov Tselkov
.
E-Net Models of a Software System for Web Pages Security
In
Computer Science, Cryptography and Security
., 2010.
Dimitrov, Vladimir
.
Conversion of Process Flow Diagrams to Activity Diagrams
In
Thirty Eighth Spring Conference of the Union of Bulgarian Mathematicians
. Borovetz, 2009.
Fiyolek, Katazyna
.
Relations between Bulgaria and NATO in the early 1990s (Отношенията между България и НАТО в начало на 90-те години)
., 2014.
Shalamanov, Velizar
.
"
’Practices of Security Sector Reform in Europe–the Case of Bulgaria‘
."
The Challenges of Security Sector Reform in Macedonia
12 (2002): 6-7.
Shalamanov, Velizar
.
The role of civilians in national security structures–Bulgarian experience
In
Seminar: Civilians in National Security Policy and National Security Structures
. Budapest, 2002.
Paul, Ray
, and
W. T. Tsai
.
A Real-Time Community-of-Interest Framework for Command-and-Control Applications
. Washington, D.C.: Department of Defense, 2004.
Bernardi, Simona
,
Lacramioara Dranca
, and
José Merseguer
.
"
A model-driven approach to survivability requirements assessment for critical systems
."
Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability
230, no. 5 (2016): 485-501.
Bernardi, Simona
,
Lacramioara Dranca
, and
José Merseguer
.
Modelling and Verification of Survivability Requirements for Critical Systems
In
Software Engineering and Formal Methods SEFM 2014 Collocated Workshops: HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS
. Grenoble, France, 2014.
Cropley, David H.
.
"
5.4.2 Architecting a Command and Control (C2) System
." In
INCOSE International Symposium, Session 5 Track 4: Systems Architecture Methodology and Frameworks
., 2014.
Pages
« първа
‹ предишна
…
326
327
328
329
330
331
332
333
334
…
следваща ›
последна »
481083 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all