Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Eriksson, Johan
,
Giampiero Giacomello
,
Hamoud Salhi
,
Myriam Dunn Cavelty
,
J. P. Singh
, and
M. I. Franklin
.
"
Who Controls the Internet? Beyond the Obstinacy or Obsolescence of the State
."
International Studies Review
11, no. 1 (2009): 205-230 .
Cavelty, Myriam Dunn
.
Critical information infrastructure: vulnerabilities, threats and responses
In
Disarmament Forum
., 2007.
Gupta, Sandeep
,
BS Dhaliwal
, and
Rahul Malhotra
.
"
All-Embracing Review Of Wireless Network Protocol, Optimum Network Simulator
."
International Journal of Computer & Organization Trends
3, no. 3 (2013).
Ferris, John
.
"
After the RMA: Contemporary Intelligence, Power and War
." In
The Ashgate Research Companion to Modern Warfare
. London: Routledge, 2010.
Hansel, Mischa
.
"
Stuxnet und die Sabotage des iranischen Atomprogramms: Ein neuer Kriegsschauplatz im Cyberspace?
" In
Handbuch Kriegstheorien
, 564-576. Wiesbaden: VS Verlag für Sozialwissenschaften, 2011.
Dickow, Marcel
,
Mischa Hansel
, and
Max M. Mutschler
.
"
Präventive Rüstungskontrolle – Möglichkeiten und Grenzen mit Blick auf die Digitalisierung und Automatisierung des Krieges
."
Sicherheit und Frieden (S+F) / Security and Peace
33, no. 2 (2015): 67-73 .
Cavelty, Myriam Dunn
.
"
Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erklärungen
."
Journal of self-regulation and regulation
01 (2015).
Cavelty, Myriam Dunn
.
"
Cyber(Un)Sicherheit: Grundlagen, Trends und Herausforderungen
."
Polit Bild
(2012).
Lakomy, Miron
.
Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw
. Vol. 21. Katowice: Wydawnictwo Uniwersytetu Śląskiego, 2015.
Dunn, Myriam A.
.
"
Securing the Information Age The Challenges of Complexity for Critical Infrastructure Protection and IR Theory
." In
International Relations and Security in the Digital Age
. London: Routledge, 2007.
Cavelty, Myriam Dunn
.
Critical Information Infrastructure Protection, Overview
. ETH Zurich, Switzerland.: Center for Security Studies (CSS), 2008.
Jones, Calvert W.
.
Online Impression Management: Case studies of activist Web sites and their credibility enhancing tactics during the Kosovo conflict
In
School of Information Management and Systems
. University of California at Berkeley, 2005.
Oppermann, Daniel
.
"
Virtual attacks and the problem of responsibility: the case of China and Russia
."
Carta Internacional
5, no. 2 (2010).
Oppermann, Daniel
.
Governança multisetorial e o processo de governança da internet: Um estudo de caso sobre crime cibernético e filtragem na internet entre 1990 e 2010
In
Instituto de Relações Internacionais (IREL)
. Vol. Programa de Doutorado. Universidade de Brasília, 2012.
Vieira, Vivian Patricia P.
.
Os Efeitos da Comunicação Digital na Dinâmica do Ativismo Transnacional Contemporâneo: Um Estudo Sobre Al-Qaeda, Wikileaks e Primavera Árabe
In
Instituto De Relações Internacionais
. Vol. Programa De Pós-Graduação Em Relações Internacionais. Brasília: Universidade De Brasília, 2016.
da Costa, Manuel Artur Corr
.
O ciberespaço como nova dimensão nos conflitos
In
Departamento De Estudos Pós-Graduados, Curso De Promoção A Oficial Superior Da Força Aérea
. Pedrouços: Instituto Universitário Militar, 2017.
Rawnsley, Gary D.
.
"
Old Wine in New Bottles: China-Taiwan Computer-Based 'Information Warfare' and Propaganda
."
International Affairs (Royal Institute of International Affairs 1944-)
81, no. 5 (2005): 1061-1078 .
Carafano, James Jay
.
Wiki at War: Conflict in a Socially Networked World
. USA: Texas A&M University Press, 2011.
Libicki, Martin C.
.
Cyberspace in Peace and War
. Naval Institute Press, 2016.
Wang, Zhenzi
,
Zhi-Qiang Liu
, and
Steve Fore
.
"
Facing the Challenge: Chinese Television in the New Media Era
."
Media International Australia
114, no. 1 (2005): 135-146.
Zhou, Xiang
.
Framing the Internet in China: Cross-Cultural Comparisons of Newspapers’ Coverage in China, Hong Kong, Singapore, the United States, and the United Kingdom
. Vol. PhD. University of Tennessee, 2006.
Osahenvemwen, O. A.
, and
Ogbeide K. O.
.
"
The Role of Internet and Effects on Nigerians
."
International Journal of Engineering Innovation & Research
3, no. 4 (2014).
Ventre, Daniel
.
"
Le rapport Mandiant et la perception américaine de la menace chinoise
."
Dans Sécurité globale
1, no. 23 (2013): 53-64.
Svete, Uroš
.
Novi izzivi za obramboslovje - obrambne in varnostne razsežnosti uporabe informacijske tehnologije
., 2004.
Cavelty, Myriam Dunn
.
"
Cyber-Terror– Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate
."
Journal of Information Technology & Politics
4, no. 1 (2007).
Pages
« първа
‹ предишна
…
330
331
332
333
334
335
336
337
338
…
следваща ›
последна »
481092 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all