Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Légaré, Christian. Designing the Internet of Things: Part 1 — IoT Devices and Local Networks. EDN Network, 2014. Pfister, Cuno. Getting started with the Internet of Things. Sebastopol, CA: O’Reilly Media, 2011. da Costa, Francis, and Byron Henderson. Rethinking the Internet of Things - A Scalable Approach to Connecting Everything. New York: Apress, 2014. Gonzalez, Marcelo Hector, and Jana Djurica. "Internet of Things Offers Great Opportunities and Much Risk." ISACA Journal 2 (2015). Monte, Matthew. Network Attacks and Exploitation: A Framework. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2015. Dhanjani, Nitesh. Abusing the Internet of Things - Blackouts, Freakouts and Stakeouts. Sebastopol, CA: O’Reilly, 2015. Hersent, Olivier, David Boswarthick, and Omar Elloumi. The Internet of Things - Key Applications and Protocols. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2012. Jing, Qi, Athanasios V. Vasilakos, Jiafu Wan, Jingwei Lu, and Dechao Qiu. "Security of the Internet of Things: perspectives and challenges." Wireless Networks 20, no. 8 (2014): 2481-2501. Martin, Robert. "The Internet of Things (IoT) –Removing the Human Element." Infosec Writers (2015). Bachmann, Sascha-Dominik, and Hakan Gunneriusson. "Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Peace and Security." The Journal of Terorism and Security Analysis (2014): 26-36. "The National Security Concept of the Republic of Bulgaria." National Security Priorities and Factors (1998): 5. The National Security Strategy of the Republic of Bulgaria (Sector Security Policies. Financial and Economic Security Policies). Approved by the National Assembly Decision of 25 February 2011, State Gazette, no. 1 ed., 2011. Feaster, Seth W., Nelson D. Schwartz, and Tom Kuntz. "It's All Connected: A Spectators Guide to the Euro Crisis." New York Times (2011). Slatinski, Nickolay. On Five Levels of Security. Sofia: Military publishing house, 2010. Dobbs, Richard, Jonathan Woetzel, Susan Lund, and Mina Mutafchieva. Debt and (not much) deleveraging. McKinsey Global Institute, 2015. Yordanova, Gergana. Sovereign Debt Modeling Within the Context of the National Security Policy of the Republic of Bulgaria. Vol. Dissertation. Sofia: Central Research and Technical Library, 2016. Deriglazova, Larisa. "Asymmetric character of contemporary conflicts." Geopolitics Magazine (2010). Christie, Paul. Ukraine`s fate no one cares In Economic Bulletin. Bremen, Lower Saxony, Germany: Professional Public Conversation by the European, 2014. Stanev, Zhivko. "Paradigm of Geo-economics: Global Moving Power in XXI century." Geopolitics Magazine 3 (2006). Cielen, Davy, Arno D. B. Meysman, and Mohamed Ali. Introducing Data Science: Big Data, Machine Learning, and More, Using Python Tools. Shelter Island, NY: Manning, 2016. Lescovec, Jure, Anand Rajaraman, and Jeffrey D. Ullman. Mining of Massive Datasets. Second ed. Cambridge: Cambridge University Press, 2014. McIlwraith, Douglas G., Haralambos Marmanis, and Dmitry Babenko. Algorithms of the Intelligent Web. Second ed. Shelter Island, NY: Manning, 2016. Russell, Stuart, and Peter Norvig. Artificial Intelligence: A Modern Approach. Third edition. Harlow, Essex, UK: Pearson Education, 2014. Cederberg, Aapo, and Pasi Eronen. "How Can Societies Be Defended Against Hybrid Threats?" Strategic Security Analysis 9 (2015). Fleming, Brian P.. The Hybrid Threat Concept: Contemporary War, Military Planning and the Advent of Unrestricted Operational Art In School of Advanced Military Studies. Fort Leavenworth, Kansas: United States Army Command and General Staff College, 2011. Pages« първа ‹ предишна … 278 279 280 281 282 283 284 285 286 … следваща › последна »