Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Hai-Jew, Shalin. "Inducing Six-Word Stories From Curated Text Sets to Anticipate Cyberwar in 4IR." In Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution. IGI Global, 2018. Ampofo, Lawrence Peter. Terrorism 3.0: Understanding Perceptions of Technology, Terrorism and Counter-Terrorism in Spain In Department of Politics and International Relations. Vol. D. Phil in Politics and International Relations. London: Royal Holloway University of London, 2011. Ehrhart, Hans-Georg, Hendrik Hegemann, and Martin Kahl. Putting security governance to the test. London: Routledge, 2015. Hughes, Dan. A discourse in conflict: resolving the definitional uncertainty of cyber war In Master of Arts in Defence and Security Studies. Albany, New Zealand: Massey University, 2017. Williams, Crystal D.. The socialization of secure computing practices for home internet users: A quantitative analysis of individual perceptions. Vol. Doctor of Philosophy. Capella University, 2015. Smeets, Max. "Organisational integration of offensive cyber capabilities: A primer on the benefits and risks." In 2017 9th International Conference on Cyber Conflict (CyCon) . Tallinn, Estonia , 2017. Hoskins, Brittany N.. The Rhetoric of Commoditized Vulnerabilities: Ethical Discourses in Cybersecurity. Vol. Master of Arts. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2015. Labrie, Mathieu. La Sécurisation du Cyberterrorisme aux États-Unis. Vol. Maîtrise en science politique. Université du Québec à Montréal, 2011. Simons, Hans Jozef Adri. Consensual Hallucinations the Politics of Identity in Dutch Cyber Security Policy. Vol. Master of Science in Political Science. Radboud University Nijmegen, 2014. Kovačević, Božo. "Američko javno-privatno partnerstvo i cyber sigurnost." Politička misao 51, no. 3 (2014): 76-100. Lauren, M. K., J. M. Smith, J. Moffat, and N. D. Perry. Using the Fractal Attrition Equation to Construct a Metamodel of the Mana Cellular Automaton Combat Model In The Technical Cooperation Program, Joint Systems and Analysis Group., 2005. McIntosh, G. C., and M. K. Lauren. " Incorporating Fractal Concepts into Equations of Attrition for Military Conflicts." The Journal of the Operational Research Society 59, no. 5 (2008): 703-713 . McIntosh, G.C., and M.K. Lauren. "Incorporating Fractal Concepts into Equations of Attrition for Military Conflicts." In OR, Defence and Security. The OR Essentials series, 101-123. London: Palgrave Macmillan, 2015. Vasileiadis, Alexios. "Security Concerns and Trust in the Adoption of M-Commerce." Social Technologies 4, no. 1 (2014): 179-191. Marufu, Anesu M. C., and Khulumani Sibanda. "An M-Commerce Security Framework for ICT4D Contexts." In Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2013. Spier Wine Estate, Stellenbosch, Western Cape, South Africa, 2013. Alqatan, S, D Singh, and Kamsuriah Ahmad. "Study on success factors to enhance customer trust for mobile commerce in small and medium-sized tourism enterprises (SMTEs) - A conceptual model." Journal of Theoretical and Applied Information Technology 46, no. 2 (2012): 550-564. Lina, Iuon-Chang, Hsia-Hung Oub, and Min-Shiang Hwang. "Efficient access control and key management schemes for mobile agents." Computer Standards & Interfaces 26, no. 5 (2004): 423-433. Nikooghadam, Morteza, and Ali Zakerolhosseini. "Secure Communication of Medical Information Using Mobile Agents." Journal of Medical Systems 36, no. 6 (2012): 3839-3850. Nikooghadam, Morteza, Farshad Safaei, and Ali Zakerolhosseini. "An efficient key management scheme for mobile agents in distributed networks." In 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010) . Solan, India , 2010. Pan, Jen-Yi, Tzer-Long Chen, and Tzer-Shyong Chen. A Novel Key Management and Access Control Scheme for Mobile Agent In Computational Intelligence. ICIC 2006. Lecture Notes in Computer Science. Vol. 4114. Berlin, Heidelberg: Springer, 2006. Lei, Ming, Quanjun Yin, and Xinyu Yao. "A method of encircle tactic based on geometric analysis in pursuit-evasion games." In 2016 IEEE International Conference on Mechatronics and Automation. Harbin, China , 2016. G., Lenzini, Sahli N., and Eertink H.. Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities In Trust in Agent Societies. TRUST 2008. Lecture Notes in Computer Science. Vol. 5396. Berlin, Heidelberg: Springer, 2008. Sahli, Nabil, Gabriele Lenzini, and Henk Eertink. Trustworthy Agent-Based Recommender System in a Mobile P2P Environment In Agents and Peer-to-Peer Computing. AP2PC 2009, AP2PC 2008. Lecture Notes in Computer Science. Vol. 6573. Berlin, Heidelberg: Springer, 2009. Wong, Yung H.. Ignoring the Innocent: Non-combatants in Urban Operations and in Military Models and Simulations. Vol. Dissertation rept. Santa Monica, CA: Rand Graduate School Santa Monica CA, 2006. Carbo, Javier, and Agapito Ledezma. A Machine Learning Based Evaluation of a Negotiation between Agents Involving Fuzzy Counter-Offers In Advances in Web Intelligence First International AtlanticWeb Intelligence Conference, AWIC 2003. Madrid, Spain, 2003. Pages« първа ‹ предишна … 332 333 334 335 336 337 338 339 340 … следваща › последна »