Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Ehrhart, Hans-Georg
,
Hendrik Hegemann
, and
Martin Kahl
.
Putting security governance to the test
. London: Routledge, 2015.
Hughes, Dan
.
A discourse in conflict: resolving the definitional uncertainty of cyber war
In
Master of Arts in Defence and Security Studies
. Albany, New Zealand: Massey University, 2017.
Williams, Crystal D.
.
The socialization of secure computing practices for home internet users: A quantitative analysis of individual perceptions
. Vol. Doctor of Philosophy. Capella University, 2015.
Smeets, Max
.
"
Organisational integration of offensive cyber capabilities: A primer on the benefits and risks
." In
2017 9th International Conference on Cyber Conflict (CyCon)
. Tallinn, Estonia , 2017.
Hoskins, Brittany N.
.
The Rhetoric of Commoditized Vulnerabilities: Ethical Discourses in Cybersecurity
. Vol. Master of Arts. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2015.
Labrie, Mathieu
.
La Sécurisation du Cyberterrorisme aux États-Unis
. Vol. Maîtrise en science politique. Université du Québec à Montréal, 2011.
Simons, Hans Jozef Adri
.
Consensual Hallucinations the Politics of Identity in Dutch Cyber Security Policy
. Vol. Master of Science in Political Science. Radboud University Nijmegen, 2014.
Kovačević, Božo
.
"
Američko javno-privatno partnerstvo i cyber sigurnost
."
Politička misao
51, no. 3 (2014): 76-100.
Lauren, M. K.
,
J. M. Smith
,
J. Moffat
, and
N. D. Perry
.
Using the Fractal Attrition Equation to Construct a Metamodel of the Mana Cellular Automaton Combat Model
In
The Technical Cooperation Program, Joint Systems and Analysis Group
., 2005.
McIntosh, G. C.
, and
M. K. Lauren
.
"
Incorporating Fractal Concepts into Equations of Attrition for Military Conflicts
."
The Journal of the Operational Research Society
59, no. 5 (2008): 703-713 .
McIntosh, G.C.
, and
M.K. Lauren
.
"
Incorporating Fractal Concepts into Equations of Attrition for Military Conflicts
." In
OR, Defence and Security. The OR Essentials series
, 101-123. London: Palgrave Macmillan, 2015.
Vasileiadis, Alexios
.
"
Security Concerns and Trust in the Adoption of M-Commerce
."
Social Technologies
4, no. 1 (2014): 179-191.
Marufu, Anesu M. C.
, and
Khulumani Sibanda
.
"
An M-Commerce Security Framework for ICT4D Contexts
." In
Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2013
. Spier Wine Estate, Stellenbosch, Western Cape, South Africa, 2013.
Alqatan, S
,
D Singh
, and
Kamsuriah Ahmad
.
"
Study on success factors to enhance customer trust for mobile commerce in small and medium-sized tourism enterprises (SMTEs) - A conceptual model
."
Journal of Theoretical and Applied Information Technology
46, no. 2 (2012): 550-564.
Lina, Iuon-Chang
,
Hsia-Hung Oub
, and
Min-Shiang Hwang
.
"
Efficient access control and key management schemes for mobile agents
."
Computer Standards & Interfaces
26, no. 5 (2004): 423-433.
Nikooghadam, Morteza
, and
Ali Zakerolhosseini
.
"
Secure Communication of Medical Information Using Mobile Agents
."
Journal of Medical Systems
36, no. 6 (2012): 3839-3850.
Nikooghadam, Morteza
,
Farshad Safaei
, and
Ali Zakerolhosseini
.
"
An efficient key management scheme for mobile agents in distributed networks
." In
2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)
. Solan, India , 2010.
Pan, Jen-Yi
,
Tzer-Long Chen
, and
Tzer-Shyong Chen
.
A Novel Key Management and Access Control Scheme for Mobile Agent
In
Computational Intelligence. ICIC 2006. Lecture Notes in Computer Science
. Vol. 4114. Berlin, Heidelberg: Springer, 2006.
Lei, Ming
,
Quanjun Yin
, and
Xinyu Yao
.
"
A method of encircle tactic based on geometric analysis in pursuit-evasion games
." In
2016 IEEE International Conference on Mechatronics and Automation
. Harbin, China , 2016.
G., Lenzini
,
Sahli N.
, and
Eertink H.
.
Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities
In
Trust in Agent Societies. TRUST 2008. Lecture Notes in Computer Science
. Vol. 5396. Berlin, Heidelberg: Springer, 2008.
Sahli, Nabil
,
Gabriele Lenzini
, and
Henk Eertink
.
Trustworthy Agent-Based Recommender System in a Mobile P2P Environment
In
Agents and Peer-to-Peer Computing. AP2PC 2009, AP2PC 2008. Lecture Notes in Computer Science
. Vol. 6573. Berlin, Heidelberg: Springer, 2009.
Wong, Yung H.
.
Ignoring the Innocent: Non-combatants in Urban Operations and in Military Models and Simulations
. Vol. Dissertation rept. Santa Monica, CA: Rand Graduate School Santa Monica CA, 2006.
Carbo, Javier
, and
Agapito Ledezma
.
A Machine Learning Based Evaluation of a Negotiation between Agents Involving Fuzzy Counter-Offers
In
Advances in Web Intelligence First International AtlanticWeb Intelligence Conference, AWIC 2003
. Madrid, Spain, 2003.
Carbo, Javier
,
José M. Molina
, and
Jorge Davila
.
"
Avoiding Malicious Agents in E-Commerce Using Fuzzy Recommendations
."
Journal of Organizational Computing and Electronic Commerce
17, no. 2 (2007): 101-117.
Carbo, Javier
,
Jesús García
, and
José M. Molina
.
"
Convergence of agent reputation with Alpha-Beta filtering vs. a fuzzy system
." In
Computational Intelligence for Modelling, Control and Automation, International Conference on (2005)
. Vienna, Austria, 2005.
Pages
« първа
‹ предишна
…
332
333
334
335
336
337
338
339
340
…
следваща ›
последна »
481100 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all