Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Cavelty, Myriam Dunn
.
"
From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse
."
International Studies Review
15 (2013): 105-122.
Karatzogianni, Athina
.
Cyber-Conflict and Global Politics
. Routledge, 2009.
Lawson, Sean
.
Beyond cyber-doom: Cyberattack Scenarios and the Evidence of History
In
Working Paper
. Mercatus Center, George Mason University, 2011.
Giacomello, Giampiero
.
National Governments and Control of the Internet: A Digital Challenge
. London: Routledge, 2004.
Barnard-Wills, David
, and
Debi Ashenden
.
"
Securing Virtual Space: Cyber War, Cyber Terror, and Risk
."
Space and Culture
XX, no. X (2012): 1-14.
Lawson, Sean
.
"
Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats
."
Journal of Information Technology & Politics
10, no. 1 (2013).
Mendez, Fernando
.
"
The European Union and cybercrime: insights from comparative federalism
."
Journal of European Public Policy
12, no. 3 (2005).
Stevens, Tim
.
Cyber Security and the Politics of Time
. Cambridge University Press, 2016.
Slayton, Rebecca
.
"
What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment
."
International Security
41, no. 3 (2017).
Eskola, Marko
.
"
From Risk Society to Network Society: Preventing Cybercrimes in the 21st Century
."
Journal of Applied Security Research
7, no. 1 (2012).
Ashenden, Debi
.
"
Cyber Security: Time for Engagement and Debate
." In
European Conference on Information Warfare and Security
., 2011.
Lawson, Sean
.
"
Motivating Cybersecurity: Assessing the Status of Critical Infrastructure as an Object of Cyber Threats
." In
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
, 168-189. IGI Global, 2013.
Ashraf, Cameran Hooshang
.
The Spatiality of Power in Internet Control and Cyberwar
. Vol. Doctor of Philosophy in Geography. Los Angeles: University of California, 2015.
"
Securing the homeland: critical infrastructure, risk and (in)security. Introduction
." In
Securing 'the Homeland': Critical Infrastructure, Risk and (In)Security
. Routledge, 2008.
Gomez, Miguel Alberto N.
.
"
Arming Cyberspace: The Militarization of a Virtual Domain
."
Global Security and Intelligence Studies
1, no. 2 (2016).
Tomblin, Jordon
.
The Rehearsal and Performance of Lawful Access
. Vol. Master of Arts in Sociology: Specialization in Digital Humanities. Ontario: Carleton University Ottawa, 2015.
Walter, Gregor
.
Internetkriminalität: eine Schattenseite der Globalisierung
In
SWP-Studie
. Berlin: Stiftung Wissenschaft und Politik -SWP- Deutsches Institut für Internationale Politik und Sicherheit, 2008.
Siudak, Piotr
.
"
Redefining cybersecurity through processual ontology of the cyberspace
."
Politeja
50, no. 14 (2017): 194-211.
Smeets, Max
.
"
Integrating offensive cyber capabilities: meaning, dilemmas, and assessment
."
Defence Studies
18, no. 4 (2018).
Boys, James D.
.
"
The Clinton administration’s development and implementation of cybersecurity strategy (1993–2001)
."
Intelligence and National Security
33, no. 5 (2018).
Cavelty, Myriam Dunn
.
"
Like a Phoenix from the Ashes: The Reinvention of Critical Infrastructure Protection as Distributed Security
." In
Securing the homeland
. London: Routledge, 2008.
Jones, Synthia S.
,
Bernard Flowers
, and
Karlton D. Johnson
.
To Wield Excalibur: Seeking Unity of Effort in Joint Information Operations
. Joint Forces Staff College, Joint and Combined Staff Officer School, 2002.
Technology in the 21st Century
. WordPress.com, 2012.
Hai-Jew, Shalin
.
"
Inducing Six-Word Stories From Curated Text Sets to Anticipate Cyberwar in 4IR
." In
Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution
. IGI Global, 2018.
Ampofo, Lawrence Peter
.
Terrorism 3.0: Understanding Perceptions of Technology, Terrorism and Counter-Terrorism in Spain
In
Department of Politics and International Relations
. Vol. D. Phil in Politics and International Relations. London: Royal Holloway University of London, 2011.
Pages
« първа
‹ предишна
…
331
332
333
334
335
336
337
338
339
…
следваща ›
последна »
481098 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all