Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Bertolino, Antonia, Antonello Calabrò, Eda Marchetti, Anton Cervantes Sala, Guiomar Tuñón de Hita, Ilie Daniel Ghe Pop, and Varun Gowtham. "Perceived Needs and Gains from an Industrial Study in Cloud Testing Automation." In IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion). Zurich, Switzerland , 2018. Sotiriadis, Stelios, Andrus Lehmets, Euripides G. M. Petrakis, and Nik Bessis. Unit and Integration Testing of Modular Cloud Services In IEEE 31st International Conference on Advanced Information Networking and Applications (AINA). Taipei, Taiwan , 2017. Sotiriadis, Stelios, Andrus Lehmets, Euripides G. M. Petrakis, and Nik Bessis. Testing Cloud Services Using the TestCast Tool In Information Technology - New Generations, 14th International Conference on Information Technology., 2017. Rodrigues, Renato. Defining a test automation system for mobile apps In Faculdade de Engenharia. Vol. Mestrado Integrado em Engenharia Informática e Computação. Universidade do Porto, 2014. Nunes, Sérgio Rodrigues. Value focused assessment of cyber risks to gain benefits from security investments In Instituto Superior de Economia e Gestão. Vol. Doutor em Gestão. Universidade de Lisboa, 2018. Apple, Benjamin G.. How the adoption of the big-data paradigm affects the key factors that influence the effectiveness of an information assurance (IA) framework: A multiple-case study. Capella University, 2017. Нигматуллин, Ришат Вахид, and Римма Рифха Сулейманова. "Стратегия ООН в борьбе с транснациональной организованной преступностью." Всероссийский криминологический журнал (2016). Carr, Chadd. Exploration into the Types, Operational Areas, and Peripheral Resources of Cyber Threat Intelligence: An Expert Panel Delphi Study. Northcentral University, 2017. Готчина, Лариса Влади. "Криминологическая характеристика российской наркопреступности: структура, динамика и прогноз." Всероссийский криминологический журнал (2017). Bichler, Gisela, Aili Malm, and Tristen Cooper. "Drug supply networks: a systematic review of the organizational structure of illicit drug trade." Crime ScienceAn Interdisciplinary Journal 6, no. 2 (2017). Zheng, Quan, and David B. Skillicorn. "Analysis of criminal social networks with typed and directed edges." In IEEE International Conference on Intelligence and Security Informatics (ISI). Baltimore, MD, USA , 2015. Bright, David, Johan Koskinen, and Aili Malm. "Illicit Network Dynamics: The Formation and Evolution of a Drug Trafficking Network." Journal of Quantitative Criminology (2018): 1-22. Malm, Aili, Martin Bouchard, , Marieke Vlaemynck, and Marije Wouters. "More structural holes, more risk? Network structure and risk perception among marijuana growers." Social Networks Volume 51 (2017): 127-134. Bahulkar, Ashwin, Boleslaw K. Szymanski, Orkun N. Baycik, and Thomas C. Sharkey. "Community detection with edge augmentation in criminal networks." In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Barcelona, Spain , 2018. Zheng, Quan, and David Skillicorn. Social Networks with Rich Edge Semantics (Open Access). Boca Raton: CRC Press, 2017. Bahulkar, Ashwin, Orkun N. Baycik, Thomas Sharkey, Yeming Shen, Boleslaw Szymanski, and William Wallace. "Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks." In IEEE International Symposium on Technologies for Homeland Security (HST). Woburn, MA, USA , 2018. Zheng, Quan. Spectral Techniques for Heterogeneous Social Networks In School of Computing. Vol. Doctor of Philosophy . Ontario, Canada: Queen’s University Kingston, 2016. Backman, Sarah. The institutionalization of cybersecurity management at the EU-Level: 2013-2016 In Swedish National Defence College. Vol. Master. Swedish Defence University, 2016. Cullen, Daniel Thomas. Building a Computer Security Incident Response Team: Required Skills and Characteristic. Vol. Dissertation. Northcentral University, 2018. Quisumbing, Lowell A.. "Global Perspectives on Cyber security Using Latent Dirichlet Allocation Algorithm." International Journal of Applied Engineering Research 12, no. 20 (2017): 10310-10323. De Prijck, Anke. The terminology of cybercrime. A contribution to the IATE-CvT project (English-Dutch-Spanish) In Faculteit Letteren & Wijsbegeerte. Vol. Master in het Vertalen. Universiteit Gent, 2016. Tumkevič, A.. "Uncertain Security Community: Building Western Cyber-Security Order." Journal of Information Warfare; Yorktown 17, no. 1 (2018): 74-86. Demchak, Chris, Jason Kerben, Jennifer McArdle, and Francesca Spidalieri. United States of America: Cyber Readiness at a Glance. Potomac Institute for Policy Studies, 2016. F., III. Scalise Be. Exploring the Policies, Cybersecurity Strategists Need to Combat Non-state Actors in the Cyber-Domain of U.S. Military Warfare. Vol. Dissertation. Colorado Technical University, 2019. Tumkevič, Agnija. Tarptautinio bendradarbiavimo ir konflikto potencialas kibernetinėje erdvėje. Vol. Daktaro disertacija. Vilniaus Universitetas, 2019. Pages« първа ‹ предишна … 362 363 364 365 366 367 368 369 370 … следваща › последна »