Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Kortjan, Noluxolo, and Rossouw von Solms. Cyber Security Education in Developing Countries: A South African Perspective In e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol. 119. Berlin, Heidelberg: Springer, 2012. Mavee, S.M.A., and E.M. Ehlers. A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power Grid In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK: IEEE, 2012. Setiawan, Ahmad Budi, Aries Syamsudin, and Ashwin Sasongko. "Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity." In 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec). Jakarta, Indonesia : IEEE, 2015. Christensen, Sharon, William J. Caelli, William D. Duncan, and Eugenia Georgiades. "An Achilles heel: denial of service attacks on Australian critical information infrastructures." Information & Communications Technology Law 19, no. 1 (2010). Hua, Jian, and Sanjay Bapna. Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking In CIS 2011 Proceedings. Vol. 4., 2011. Musarurwa, Alfred, and Husin Jazri. "A proposed framework to measure growth of Critical Information Infrastructure Protection in Africa." In 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). Windhoek, Namibia: IEEE, 2015. Mohideen, Feroze. The Cyber-Security State of our Nation: A Critique of South Africas Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure In ICCWS 2016 11th International Conference on Cyber Warfare and Security ., 2016. Hamida, Yaou, Baina Amine, and Bellafkih Mostafa. "Toward resilience management in critical information infrastructure." In 2015 5th World Congress on Information and Communication Technologies (WICT). Marrakech, Morocco : IEEE, 2015. Ahmad, Arniyati. A cyber exercise post assessment framework: In Malaysia perspectives In School of Computing Science, College of Science and Engineering . Vol. Doctor of Philosophy. University of Glasgow, 2016. von Solms, R, and B von Solms. "National Cyber Security in South Africa: A Letter to the Minister of Cyber Security." In Iccws 2015 - The Proceedings of the 10th International Conference on Cyber Warfare and Security. South Africa, 2015. Amideo, Annunziata Esposito, and Maria Paola Scaparra. A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability In Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science. Vol. 10242. Paris, France , 2017. Gelbstein, Eduardo E.. "Designing a Security Audit Plan for a Critical Information Infrastructure (CII)." In Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, 262-285., 2013. Setiawan, Ahmad Budi. "Peningkatan Keamanan Supervisory Control and Data Acquisition (Scada) Pada Smart Grid Sebagai Infrastruktur Kritis." Jurnal Penelitian Pos dan informatika 6, no. 1 (2016). Martins, José, Henriques dos Santos, and Paulo Nunes. "Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação." Proelium (Revista Científica da Academia Militar) VII (2012): 31-66. Musarurwa, Alfred, and Husin Jazri. "A Proposed Framework to Measure Growth of Critical Information Infrastructure Protection in Africa." In Conference: International Conference on Emerging Trends in Network and Computer Communication. Namibia, 2014. Martin, Ioana. Critical Information Infrastructure Protection: Towards Global Cyber Security In Regional Department of Defense Resources Management Studies. Romanian National Defense University, 2014. Herrera, Luis-Carlos, and Olaf Maennel. "A comprehensive instrument for identifying critical information infrastructure services." International Journal of Critical Infrastructure Protection 25 (2019): 50-61. Deliverable D7.1: Review of the State-of-the-Art in Cyberattacks In Seventh Framework Programme Information & Communication Technologies Trustworthy ICT, Network of Excellence., 2011. Velasquez, Luis Carlos Her. A Comprehensive Instrument for Identifying Critical Information Infrastructure Services In Institute of Computer Science, Cyber Security Curriculum. Vol. Master’s Thesis. University of Tartu, 2016. Njotini, MN. "Protecting Critical Databases: Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa." Potchefstroom Electronic Law Journal 16, no. 1 (2013). Unger, Brigitte, and Johan den Hertog. "Water always finds its way: Identifying new forms of money laundering." Crime, Law and Social Change 57, no. 3 (2012): 287-304. Odi, Nwankwo, and Onyekachi Richard Eze. " Electronic Payment in Cashless Economy of Nigeria: Problems and Prospect." Journal of Management Research 5, no. 1 (2013). Tsakalidis, George, and Kostas Vergidis. "A Systematic Approach Toward Description and Classification of Cybercrime Incidents." IEEE Transactions on Systems, Man, and Cybernetics: Systems (2017): 1-20. Correia, Pedro Miguel Alv, and Inês Oliveira A. de Jesus. "Combate às transferências bancárias ilegítimas pela Internet no direito português: entre as experiências domésticas e políticas globais concertadas." Revista Direito GV 12, no. 2 (2016). Mehmet, Murad, and Duminda Wijesekera. "Ontological Constructs to Create Money Laundering Schemes." In STIDS 2010 Proceedings., 2010. Pages« първа ‹ предишна … 346 347 348 349 350 351 352 353 354 … следваща › последна »