Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Krempel, Erik, and Jürgen Beyerer. "TAM-VS: A Technology Acceptance Model for Video Surveillance." In Privacy Technologies and Policy, Lecture Notes in Computer Science, 86-100. Vol. 8450. Cham: Springer, 2014. Rajamäki, Jyri, Sari Sarlio-Siintola, and Jussi Simola. Ethics of Open Source Intelligence Applied by Maritime Law Enforcement Authorities In 17th European Conference on Cyber Warfare and Security ECCWS. Oslo, Norway, 2018. Hustinx, Peter. "Privacy by Design: Delivering the Promises." Identity in the Information Society 3, no. 2 (2010): 253-255. Cavoukian, Ann. Privacy by Design: The 7 Foundational Principles. Ontario : Information and Pri¬vacy Commissioner of Ontario , 2011. "Tool-Supporting Data Protection Impact Assessments with CAIRIS." In 2018 IEEE 5th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE)., 2018. Glassman, Michael, and Min Ju Kang. "Intelligence in the internet age: the emergence and evolution of OSINT." Computers in Human Behavior 28, no. 2 (2012): 673-682. Wells, Douglas, and Helen Gibson. OSINT from a UK perspective: Considerations from the law enforcement and military domains In Proceedings Estonian Academy of Security Sciences, 16: From Research to Security Union., 2017. Koops, Bert-Jaap, Jaap-Henk Hoepman, and Ronald Leenes. "Open-Source Intelligence and Privacy by Design." Computer Law & Security Review 29 (2013): 676-688. Koops, Bert-Jaap. "Police investigations in Internet Open Sources: Procedural Law Issues." Computer Law & Security Review 29 (2013): 676-688. Hu, Evanna. Responsible Data Concerns with Open Source Intelligence., 2016. Hribar, Gašper, Iztok Podbregar, and Teodora Ivanuša. "OSINT: A ‘Grey Zone’?" International Journal of Intelligence and CounterIntelligence 27 (2014): 529-549. Cuijpers, C.M.K.C.. "Legal Aspects of Open Source Intelligence – Results of the VIRTUOSO Project." Computer Law & Security Review 29, no. 6 29, no. 6 (2013): 642-653. Chen, Kedi, Fengcai Qiao, and Hui Wang. "Correlation Analysis Using Global Dataset of Events, Location and Tone." In 2016 IEEE First International Conference on Data Science in Cyberspace (DSC). Changsha, China, 2016. INCOSE Systems Engineering Handbook., 2019. Commission Nationale de l'Informatique et des Libertés. May 2018 updates for the PIA tool., 2018. Passos, Danielle Sandler do. "Big Data, Data Science and Their Contributions to the Development of the Use of Open Source Intelligence." Systems & Management 11 (2016): 392-396. Australian Government, Attorney-General's Department. Cyber Security Strategy of Australian., 2009. Barnum, Sean. Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™) In Whitepaper., 2014. Brunner, Martin, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt. "Anonymity and Privacy in Distributed Early Warning Systems." In CRITIS 2010: Critical Information Infrastructures Security., 2010. Davies, Michael, and Menisha Patel. "Are We Managing the Risk of Sharing Cyber Situational Awareness? A UK Public Sector Case Study." In 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA. London, UK, 2016. Edgar, Thomas W., and David O. Manz. Research Methods for Cyber Security . Cambridge: Elsevier, 2017. ENISA. Critical Infrastructures and Services: Maritime., 2011. CISE Architecture Visions Document (Study supporting the Impact Assessment). Brussels: European Commission, 2013. Resilience, Deterrence and Defence: Building strong cybersecurity for the EU. Brussels: European Commission, 2017. Franke, Ulrik, and Joel Brynielsson. "Cyber Situational Awareness: A Systematic Review of the Literature." Computers & Security 46 (2014): 18-31. Pages« първа ‹ предишна … 386 387 388 389 390 391 392 393 394 … следваща › последна »