Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Sharkov, George
.
"
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
."
Information & Security: An International Journal
49 (2021): 49-69 .
Sharkov, George
.
"
A System-of-Systems Approach to Cyber Security and Resilience
."
Information & Security: An International Journal
37 (2017): 69-94.
Tennoe, Mariam T.
, and
Susan F. Henssonow
.
Padding (Cryptography) Paperback
., 2010.
Meyers, Mike
,
Scott Jernigan
, and
Mike Meyers
.
CompTIA Security+ Certification Guide
. 3rd ed. , Third Edition (Exam SY0-601) 3rd Edition, , 2021.
Stuttard, Dafydd
, and
Marcus Pinto
.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
., 2007.
Hankerson, Darrel
,
Alfred J. Menezes
, and
Scott Vanstone
.
"
Guide to Elliptic Curve Cryptography
."
Springer Professional Computing
(2004).
General Security Requirements for Equipment Using the Data Encryption Standard
., 1982.
Yusof, I.
, and
A.S.K. Pathan
.
"
Mitigating cross-site scripting attacks with a content security policy
."
Computer
3, no. 49, (3) (2016): 56-63.
Hodges, J.
,
C. Jackson
, and
A. Barth
.
HTTP strict transport security
., 2012.
Calzarossa, M.C.
, and
L. Massari
.
Analysis of header usage patterns of HTTP request messages
In
16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems
., 2014.
Blagoev, Ivan
.
Application of Time Series Techniques for Random Number Generator Analysis
In
XXII Int. Conference DCCN
. Moscow, Russia, 2019.
Blagoev, Ivan
.
Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems
., 2022.
Sharkov, George
, and
Christina Todorova
.
"
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
."
Information & Security: An International Journal
37 (2017): 95-102.
Porebski, Jakub
.
Occupancy grid environmental modeling for automotive applications
In
Automatics, Computer Science and Biomedical Engineering Department of Automatic Control and Robotics
. Vol. Doctoral Dissertation. Kraków : AGH University of Science and Technology Faculty of Electrical Engineering, 2022.
Ivančík, Radoslav
.
"
Specific Education of Students of The Academy of Police Force in the Field of Security Management
." In
Medzinárodná vedecká konferencia „Nové trendy profesijnej prípravy v Ozbrojených silách“
. Liptovský Mikuláš, 2022.
Nganga, Allan
,
Joel Scanlan
,
Margareta Lützhöft
, and
Steven Mallam
.
Timely Maritime Cyber Threat Resolution in a Multi-Stakeholder Environment
In
CYBER 2022 : The Seventh International Conference on Cyber-Technologies and Cyber-Systems
., 2022.
Gaurav, Akshat
, and
Brij B. Gupta
.
"
Identificación de transacciones fraudulentas en línea y protección: técnicas de vanguardia
."
ESIC Digital Economy and Innovation Journal
1, no. 3 (2022).
Okomanyi, Abraham Onipe
.
Exploring Risk-Based Approach for Preventing Cyberattacks in the Automotive Industry
. Phoenix, Arizona: Grand Canyon University, 2022.
Beltempo, Eleonora
,
Jussi Karvonen
, and
Jyri Rajamäki
.
ECHO Cyber-Skills Framework as a Cyber-Skills Education and Training Tool in Health and Medical Tourism
In
Proceedings of the 21st European Conference on Cyber Warfare and Security (ECCWS 2022)
. Chester, UK, 2022.
Petcu, Ioana
,
Ionuţ Bogdan Candet
,
Costin Ştefănescu
,
Cristian Ionel Gruia
, and
Vlad Craioveanu
.
"
Security Risks of Cloud Computing Services from the New Cybernetics’ Threats Perspective
."
Romanian Cyber Security Journal
3, no. 1 (2021): 89-97.
Yamin, Muhammad Mudassar
,
Mohib Ullah
,
Habib Ullah
,
Basel Katt
,
Mohammad Hijji
, and
Khan Muhammad
.
"
Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
."
Mathematics
10, no. 2 (2022): 2054.
Ebbeler, Raymond Walter
.
Following the Path of Small and Medium-Sized Medical Technology Startups Seeking Funding Before FDA Clearance
. Scottsdale, AZ: Northcentral University, 2022.
Riley, Stan
.
Independent School Districts in Texas: A Focused Ethnography on Cybersecurity Barriers
. Scottsdale, AZ: Northcentral University, 2022.
Maathuis, Emanuela-Clara
.
Effects Assessment for Targeting Decisions Support in Military Cyber Operations
. Vol. PhD Dissertation. Delft, The Netherlands: Delft University of Technology, 2020.
Nazir, Ahmad
,
Achmad Nur Sholeh
,
Akhmar Barsah
, and
Mochamad Aceng
.
"
The Effect of Leadership and Motivation on Productivity Employees at PT. ISS Indonesia Bintaro - South Tangerang
."
Jurnal Ad'ministrare
9, no. 1 (2022): 2011-2016.
Pages
« първа
‹ предишна
…
511
512
513
514
515
516
517
518
519
…
следваща ›
последна »
450433 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all