Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Alharbi, Nawaf, Maria Papadaki, and Paul Dowland. "Security Factors Influencing End Users’ Adoption of E-Government." Journal of Internet Technology and Secured Transactions (JITST) 3, no. 4 (2014). Alharbi, Nawaf, Maria Papadaki, and Paul Dowland. "Security challenges of E-government adoption based on end users' perspective ." In The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) ., 2014. Nesterenko, Mykola. Implementation of E-Government services Analysis of factors in case of Ukraine. Vol. Master. Linnaeus University, 2014. Ihmouda, Rabia, Najwa Hayaati Mo Alwi, and Ismail Abdullah. "A Systematic Review on E-government Security Aspects." International Journal of Enhanced Research in Management & Computer Applications 3, no. 6 (2014): 60-67. Masrom, Maslin, Edith AiLing Lim, and Sabariyah Din. "Security and Quality Issues in Trusting E-Government Service Delivery." In Managing Trust in Cyberspace., 2013. Prima, Edit, Rudi Lumanto, and Zainal A. Hasibuan. "Evaluation of Government Public Key Infrastructure Implementation based on eGovAMAN Framework." In 4th International Symposium on Chaos Revolution in Science, Technology and Society . Chaosware, 2013. Ibrahim, Mahmood Khalel, and Mohammed A. Jabbar Hamid. "Secure E-Government Framework: Design and Implementation." International Journal of Computer Science Engineering and Technology (IJCSET) 3, no. 5 (2013): 186-193. Mirković, Bogdan. "Razvojni okvir međuorganizacionog informacionog sistema za upravljanje fondom divljači." INFOTEH-JAHORINA 12 (2013). Iskender, Gökhan. "e-Government Transformation Success: An Assessment Methodology and the Preliminary Results." Transforming Government People Process and Policy 7, no. 3 (2013). Rana, Nripendra P., Yogesh K. Dwivedi, and Michael D. Williams. "Analysing challenges, barriers and CSF of egov adoption." Transforming Government People Process and Policy 7, no. 2 (2013). Rana, Nripendra P., Yogesh K. Dwivedi, and Michael D. Williams. "E-Government Adoption Research: Analysing challenges and Critical Success Factors." In European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS2012). Munich, Germany, 2012. Bui, Khac-Hoai Nam, and Jason J. Jung. "Internet of agents framework for connected vehicles: A case study on distributed traffic control system." Journal of Parallel and Distributed Computing 116 (2018): 89-95. Kang, Chang Mook, Soo Jung Jeon, Seung-Hi Lee, and Chung Choo Chung. "Parametric trajectory prediction of surrounding vehicles ." In 2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES) . Vienna, Austria , 2017. G. Kumar, Saroj, Ratna Ghosh, Debasish Ghose, and A. Vengadarajan. "Guidance of Seekerless Interceptors Using Innovation Covariance Based Tuning of Kalman Filters." Journal of Guidance, Control, and Dynamics 40, no. 3 (2017): 603-614. Mao, Zhengyang, and Zhanxia Zhu. Modular Fuzzy Interacting Multiple Model for Maneuvering Target Tracking., 2017. Daniel, Milan. "A Comparison of the Generalized minC Combination and the Hybrid DSm Combination Rules." In Advances and Applications of DSmT for Information Fusion (Collected works). Vol. II. American Research Press, Rehoboth, 2006. Daniel, Milan. "Analysis of DSm belief conditioning rules and extension of their applicability." In Advances and Applications of DSmT for Information Fusion (Collected works). Vol. III. Infinite Study, 2009. Israel, Steven A., and Erik Blasch. "Context Assumptions for Threat Assessment Systems." In Context-Enhanced Information Fusion. Advances in Computer Vision and Pattern Recognition. Cham: Springer, 2016. Blasch, Erik, Youakim Badr, Salim Hariri, and Youssif Al-Nashif. "Fusion Trust Service Assessment for Crisis Management Environments." In Fusion Methodologies in Crisis Management. Cham: Springer, 2016. Blasch, Erik, Jean Dezert, and B. Pannetier. Overview of Dempster-Shafer and belief function tracking methods In Signal Processing, Sensor Fusion, and Target Recognition XXI., 2013. El-Latif, Ahmed A. Abd, Shamim M. Hossain, and Ning Wang. "Score level multibiometrics fusion approach for healthcare." Cluster Computing (2017): 1-12 . Tchamova, Albena, Jean Dezert, and Florentin Smarandache. "Object identification using T-conorm/norm fusion rule." In Advances and Applications of DSmT for Information Fusion (Collected works). Vol. III. American Research Press, Rehoboth, 2009. Tchamova, Albena, Jean Dezert, and Florentin Smarandache. "New Fusion Rules for Solving Blackman’s Association Problem." In Advances and Applications of DSmT for Information Fusion (Collected works). Vol. III. American Research Press, Rehoboth, 2009. Tchamova, Albena, and Jean Dezert. "Tracking applications with fuzzy-based fusion rules ." In 2013 IEEE INISTA . Albena, Bulgaria, 2013. Henry, Willis, and Russell Lundberg. "Integrating Stakeholder Values into Strategic Planning through Comparative RiskAnalysis." In Improving Homeland Security Decisions. Cambridge University Press, 2017. Pages« първа ‹ предишна … 303 304 305 306 307 308 309 310 311 … следваща › последна »