Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Jelovčić, Petra Amižić, and Dragan Bolanča. "Legal Combat Against Maritime Terrorism." In Scientific Cooperations 2nd International Conference on Social Sciences. Istanbul-Turkey, 2016. Vermaut, Vincent. De economische effecten van piraterij in Zuidoost-Azië. Vol. Master in de Maritieme Wetenschappen. Universiteit Antwerpen – Faculteit Toegepaste Economische Wetenschappen, Universiteit Gent – Faculteit Rechtsgeleerdheid, 2014. Bossong, Raphael, and Hendrik Hegemann. "Die Politik der zivilen Sicherheit: Bedeutungen und Wirkungen eines aufstrebenden Begriffs." Zeitschrift für Außen- und Sicherheitspolitik 10, no. 1 (2017): 39-65. Zayed, Khaled. "Information security awareness: managing web, mobile and endpoint security; overcoming the challenges of bring your own device." Int. J. Teaching and Case Studies 7, no. 3/4. de Ávila, Rafael Oliveira, and Rafael Pinto da Silva. "Brasil informacional: a seguranca cibernética como desafio à seguranca nacional." In Encontro nacional de pesquisa em ciencia da informacao., 2011. Choucri, Nazli, Chrisma Jackson, Lyla Fischer, Brooke Gier, Vivian Peron, Ben Ze Yuan, Liu Yangyue, and Glenn Voelz. Perspectives!on!Cybersecurity:!! A!Collaborative!Study! In Research Paper. Massachusetts Institute of Technology, Political!Science!Department!, 2015. Lubiano, María Asunción, Antonia Salas, and María Ángeles Gil. "A hypothesis testing-based discussion on the sensitivity of means of fuzzy data with respect to data shape." Fuzzy Sets and Systems 328 (2017): 54-69. Värnqvist, P. Reflexiv kontroll: evig metod som systematiserats? In Självständigt arbete krigsvetenskap., 2016. Ibraheem, Basem, Abeer Hamdy, and Nevien Darwish. "Textual Signs Reading for Indoor Semantic Map Construction." International Journal of Computer Applications (0975 – 8887) 53, no. 10 (2012). Shao-hua, Jiang, and Tang Wen-sheng. "A Multi-source Image Fusion Framework Supporting Parameters Optimization." Computer Engineering 39, no. 10 (2013). Khodabandeh, M., and A. Mohammad-Shahri. "Measurement Uncertainty evaluation for an ultrasonic data fusion based target differentiation problem using Generalized Aggregated Uncertainty measure 2." Measurement 59 (2015): 139-144. Mohammad, Nur, Xingming Sun, and Hengfu Yang. "An Adaptive Visible Watermarking Algorithm for BTC Compressed Images." Information Technology Journal 13, no. 3 (2014): 536-541. Pratap, Inder, Saroj Hiranwal, and N. S. Yadav. "A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC." International Journal of Computer Applications 83, no. 6 (2013): 44-48. Lubis, Fetty Fitiyanti. Teknik Video Digital Watermarking sebagai Proteksi Hak Cipta pada Distribusi Konten Multimedia In Desain Komunikasi Visual, Fakultas Industri Kreatif. Universitas Telkom, 2008. Manaf, A.A., Ali Boroujerdizade, and Seyed Mojtaba Mousavi. "Collusion-Resistant digital video watermarking for copyright protection application." International Journal of Applied Engineering Research 11, no. 5 (2016): 3484-3495. Hansel, Mischa. "Cyber-attacks and psychological IR perspectives: explaining misperceptions and escalation risks." Journal of International Relations and Development 21, no. 3 (2018): 523-551. New York Declaration for Refugees and Migrants. UN General Assembly, 2016. Deliso, Christopher. Migration, Terrorism and the Future of a Divided Europe: A Continent Transformed. Santa Barbara, CA: Praeger Security International, 2017. Parkes, Roderick. Nobody Move! Myths of the EU Migration Crisis In Chaillot Papers. Paris: EU Institute for Security Studies, 2017. Tchamova, Albena, Tzvetan Semerdjiev, Pavlina Konstantinova, and Jean Dezert. Generalized Data Association for Multitarget Tracking in Clutter In Collected works, vol. 1. American Research Press, Rehoboth, 2004. Bojilov, Ljudmil, and Pavlina Konstantinova. A Comparison study of two approaches for determining ranked set of assignments for multitarget tracking., 2017. Shafi, Kamran, and David Oliver. "Historical Operational Data Analysis for Defence Preparedness Planning." Journal of Defense Modeling & Simulation 15, no. 2 (2016). Adlakh, Mona. "Mobile Commerce Security and Its Prevention." In Securing Transactions and Payment Systems for M-Commerce. IGI Global, 2016. Benoudnine, Hadjira, Abdelkrim Meche, Mokhtar Keche, Abdelaziz Ouamri, and Malcolm S. Woolfson. "Real time Hough transform based track initiators in clutter." Information Sciences 337–338 (2016): 82-92. Mirzaei, Majid, Mina Faghih, Tan Pei Ying, Ahmed El-Shafie, Yuk Feng Huang, and Juneseok Lee. "Application of a rainfall-runoff model for regional-scale flood inundation mapping for the Langat River Basin." Water Practice and Technology 11, no. 2 (2016): 373-383. Pages« първа ‹ предишна … 305 306 307 308 309 310 311 312 313 … следваща › последна »