Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Networking Academy Course List. Cisco Networking Academy, 2016. Certifications In The Cisco Learning Network., 2016. Geographic Distribution of Cisco Networking Academies., 2016. Sequence of Cisco Courses Study In Cisco Networking Academy., 2016. CCNA Security In Cisco Networking Academy., 2016. Cisco Networking Academy Membership Guide v3.0 In Cisco Networking Academy., 2014. Beaudoin, Luc, Michael Froh, Marc Gregoire, and Julie Lefebvre. "Computer Network Defence Situational Awareness: Information Requirements." In Military Communications Conference., 2006. Lagadec, Philippe, L. Dandurand, E. Bouillon, Konrad Wrona, and S. Torrente. "Cyber Defence Situational Awareness and Dynamic Risk Assessment." In Presentation at the NATO Research and Technology Organisation Symposium on Information Assurance and Cyber Defence, IST-091. Tallin, Estonia, 2010. Wrona, Konrad, Tamsin Moye, Philippe Lagadec, Michael Street, Peter Lenk, and Frederic Jordan. "Cybersecurity Innovation in NATO: Lessons Learned and Recommendations." Information & Security: An International Journal 36 (2017). Brezhniev, Eugene, and Vyacheslav Kharchenko. "Smart Grid Safety and Security: Educational and Research Activities." Information & Security: An International Journal 35, no. 2 (2016): 165-178. Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses. Idaho Falls, ID: Idaho National Laboratory, 2010. Common Cybersecurity Vulnerabilities in Industrial Control Systems In Homeland Security, Control Systems Security Program. Washington, D.C.: National Cyber Security Division, 2011. Wandera, Max, Brent Jonasson, and Jacques Benoit. Cybersecurity Considerations for Electrical Distribution Systems In White Paper., 2014. Stamp, Jason, John Dillinger, William Young, and Jennifer DePoy. Common Vulnerabilities in Critical Infrastructure Control Systems. Albuquerque, NM: Sandia National Laboratories, 2003. Zadeh, Lotfi A., and Janusz Kacprzyk. Computing with Words in Information/Intelligent Systems – Part 1: Foundations. Berlin Heidelber: Springer, 1999. Giacobe, Nicklaus A.. Application of the JDL Data Fusion Process Model for Cyber Security In Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications. Vol. 7710. SPIE, 2010. Zhang, Yan, Shuguang Huang, Shize Guo, and Junmao Zhu. "Multi-sensor Data Fusion for Cyber Security Situation Awareness." Procedia Environmental Sciences 10, no. Part B (2011): 1029-1034. Simmhan, Yogesh L., Beth Plale, and Dennis Gannon. "A Survey of Data Provenance in e-Science." ACM SIGMOD 34, no. 3 (2005): 31-36. Stonebraker, Michael. "SQL Databases v. NoSQL Databases." Communications of the ACM 53, no. 4 (2010): 10-11. Elastic., 2016. Lagadec, Philippe. "Visualisation et Analyse de Risque Dynamique pour la Cyber- Défense." In Symposium sur la Sécurité des Technologies de l’Information et de la Communication (SSTIC). Rennes, 2010. Armando, Alessandro, Gabriele Costa, and Alessio Merlo. Bring Your Own Device, Securely In 28th Annual ACM Symposium on Applied Computing, SAC’13. Coimbra, Portugal, 2013. Armando, Alessandro, Gabriele Costa, Alessio Merlo, and Luca Verderame. Enabling BYOD Through Secure Meta-market In 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec’14. Oxford, United Kingdom, 2014. Armando, Alessandro, Gabriele Costa, Alessio Merlo, Luca Verderame, and Konrad Wrona. Developing a NATO BYOD Security Policy In International Conference on Military Communications and Information System, ICMCIS. Brussels, Belgium, 2016. Buriro, Attaullah, Bruno Crispo, Filippo Del Frari, Jeffrey Klardie, and Konrad Wrona. "ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones." In Technology and Practice of Passwords, Lecture Notes in Computer Science, 45-61. Vol. 9551. Cham: Springer, 2015. Pages« първа ‹ предишна … 211 212 213 214 215 216 217 218 219 … следваща › последна »