Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Villanueva, Benjamin, and Brett Cook. Providing Students 24/7 Virtual Access and Hands-On Training Using VMWare GSX Server. SIGUCCS'05, 2005. Anderson, Benjamin R., Amy K. Joines, and Thomas E. Daniels. Xen Worlds: Leveraging Virtualization in Distance Education. ITiCSE'09, 2009. Border, Charles. The Development and Deployment of a Multi-User, Remote Access Virtualisation System for Networking, Security, and System Administration Classes. SIGCSE, 2007. Powell, Valerie J. H., Christopher T. Davis, Randall S. Johnson, Peter Y. Wu, John C. Turchek, and Ian W. Parker. VLabNet: The Integrated Design of Hands-on Learning in Information Security and Networking. InfoSecCD, 2007. Armitage, William D., Alessio Gaspar, and Matthew Rideout. A UML and MLN Based Approach to Implementing a Networking Laboratory on a Scalable Linux Cluster. CCSC'07, 2007. Kneale, Bruce, Ain Y. De Horta, and Hona Box. VELNET (Virtual Environment for Learning Networking). ACE2004, 2004. Krishna, Kumar, Weiqing Sun, Pratik Rana, Tianning Li, and R Sekar. V-NetLab: Cost-Effective Platform to Support Course Projects in Computer Society. CISSE, 2008. Galan, Fermin, David Fernandez, Walter Fuertes, Miguel Gomez, and Jorge E. Lopez de Vergara. Scenario-based Virtual Network Infrastructure Management in Research and Educational Testbeds with VNUML. TELECOM, 2009. Open Cyber Challenge Platform., 2015. OWASP Security Shepherd., 2015. About Cyber Security Challenge UK. CESG, 2015. Cyber Security Challenge UK., 2014. The UCSB iCTF Competition. UCSB, 2015. Vigna, Giovanni, Kevin Borgolte, Jacopo Corbetta, Adam Doupe, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, and Yan Shoshitaishvili. The Years of iCTF: The Good, The Bad, and The Ugly. 3GSE, 2014. Air Force Association. CyberPatriot., 2013. Fuertes, W, J E. Lopez de Vergara, and F Meneses. Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Use Cases. ACE II, 2006. Hronologija Reforme Sektora Bezbednosti u Republici Srbiji 2000–2008. Beograd: Centar za civilno-vojne odnose, 2009. Alutaibi, Khaled Shuraem. Critical Infrastructure Protection in Saudi Arabia: A Case Study on Petrochemical Industry Protection Against Terrorist Attacks at Jubail Industrial City. Dhahran, Saudi Arabia: King Fahd University of Petroleum & Minerals, 2009. Hadji-Janev, Metodi. "Threats to the Critical Infrastructure in South-East Europe posed by Al Qaeda and its Associated Movements: the case of Macedonia." In Counterterrorism challenges regarding the Critical Infrastructure protection. Center for Civil - Military Relation, Monterey, USA, Ljubljana, Slovenia , 2011. Stecher, Tina. Pathways to Regional Resilience In The Governance of Adaptation., 2012. . Захист критичної інфраструктури:Проблеми та перспективи впровадження в Україні. Київ:: НІСД, 2012. Redden, Shari Lynn. The Effectiveness of Combining Simulation and Role Playing in Nursing Education. Walden University, 2015. Стойков, Стойко. Стратегически мениджмънт на знанието в системата за сигурност и отбрана . София: Институт Общество на знанието, 2012. Цветков, Георги Младе. Формиране на отбранителната политика на Република България (1990-2010). София: ВА "Г.С. Раковски", , 2014. Petriashvili, Maka. Defense institution building: the dynamics of change in Georgia and the need for continuity of effort. Thesis : Monterey, California: Naval Postgraduate School, 2014. Pages« първа ‹ предишна … 160 161 162 163 164 165 166 167 168 … следваща › последна »