Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Manjula, D., and J. Thilagavathi. "A Novel Approach for Behavior based Charge Card Fraud Detection using Support Vector Machines." IJSRD - International Journal for Scientific Research & Development| 3, no. 6 (2015). Bach, Mirjana Pejić, Nikola Vlahović, and Jasmina Pivar. "Self-organizing maps for fraud profiling in leasing." In 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Opatija, Croatia , 2018. Grzywa, Michal, and Alior Bank S.A.. Zastosowanie Sztucznych Sieci Neuronowych w Detekcji Kartowych Transakcji Oszukańczych., 2011. Ciccone, Anne, Garcia Bodley, Tonya Hansel, Maureen McDonough, Lauren McShan, Howard Osofsky, Joy Osofsky, Erin Reuther, Lisa Schuster, Anthony Speier et al. Disaster Psychosocial Assessment and Surveillance Toolkit (Disaster-PAST): Methods to Enhance Disaster Preparedness, Response and Recovery. Louisiana State University Health Sciences Center Department of Psychiatry, 2014. Mohammadzadeh, Mohsen. The Neoliberalised City Fantasy: The place of desire and discontent. Vol. Doctor of Philosophy. University of Auckland, 2014. Lupu, Catalin, Valeriu Lupu, and Gîlc Gheorghe. Securing online banking services using iris recognition In Annals of the "Constantin Brancusi" University of Targu Jiu, Engineering Series., 2015. Abikoye, O.C., J.O. Omolehin, and J.S. Sadiku. "Some Refinement on Iris Localization Algorithm." International Journal of Engineering and Technology 2, no. 11 (2012). Forster, Benjamin. NATO's Role in the Global War on Terror: Is the Alliance Obsolete? In Claremont-UC Undergraduate Research Conference on the European Union. Vol. 2009., 2012. Wei, Li, and Xue Li. "Maritime Silk Road in the 21st Century: Security Risks and Countermeasures (21 世纪海上丝绸之路: 安全风险及其应对)." Taiping Ocean News (2015). Stuppia, Giuseppe. Pirateria e diritto internazionale: dalle vicende somale al caso Enrica Lexie. Vol. Dottorato di ricerca in Diritto internazionale e dell’Unione europea – XXIV Ciclo. Sapienza, Universita di Roma, 2013. Frühling, Stephan. "“Key to the defense of the free world”: The past, present and future relevance of NATO for US allies in the Asia–Pacific." Journal of Transatlantic Studies (2019): 1-17. Beskow, David M., and Kathleen M. Carley. "Social Cybersecurity An Emerging National Security Requirement." Military Review (2019). . "Revealing the propaganda of communication between the islamic fundamentalism activists of the middle east and Indonesia." Jurnal Komunikasi: Malaysian Journal of Communication 34, no. 2 (2018): 137-151. Holbrook, D.. "A critical analysis of the role of the internet in the preparation and planning of acts of terrorism." Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide 4, no. 2 (2015): 121-133. Hai-Jew, S.. "Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis." In Cyber Behavior: Concepts, Methodologies, Tools, and Applications , 1260-1294 ., 2014. Carlile, L., and S. MacDonald. "The criminalisation of terrorists' online preparatory acts." In Cyberterrorism: Understanding, Assessment, and Response, 155-173., 2014. Lawson, S.. "The US military's social media civil war: technology as antagonism in discourses of information-age conflict." Cambridge Review of International Affairs 27, no. 2 (2014): 226-245. Acharya, A.. Ten years after 9/11: Rethinking the jihadist threat., 2013. Ogun, M.N.. "Terrorist Use of Internet: Possible Suggestions to Prevent the Usage for Terrorist Purposes." Journal of Applied Security Research 7, no. 2 (2012): 203-217. Veerasamy, N., and M. Grobler. "Terrorist use of the internet: Exploitation and support through ICT infrastructure." In 6th International Conference on Information Warfare and Security, ICIW 2011. Washington, DC; United States, 2011. Maled, V.. "Computer forensics: A tool to prevent cybercrime." Journal of South India Medicolegal Association 2, no. 2 (2010): 60-63. Conway, Maura. "Terrorism and the Internet: New media - New threat?" Parliamentary Affairs 59, no. 2 (2006): 283-298. Vatsa, Mayank, Richa Singh, Afzel Noore, and Arun Ross. "On the Dynamic Selection of Biometric Fusion Algorithms." IEEE Transactions on Information Forensics and Security 5, no. 3 (2010). Vatsa, M., R. Singh, A. Noore, and S.K. Singh. "Belief Function Theory Based Biometric Match Score Fusion: Case Studies in Multi-instance and Multi-unit Iris Verification." In Seventh International Conference on Advances in Pattern Recognition. Kolkata, India , 2009. Khalkhali, Arezou Moussavi, Behzad Moshiri, and Hamid Reza Momeni. "Design of an Intelligent Housing System Using Sensor Data Fusion Approaches." In Sensor and Data Fusion., 2009. Pages« първа ‹ предишна … 352 353 354 355 356 357 358 359 360 … следваща › последна »