Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Khan, Rafiullah, Sarmad Ullah Khan, Rifaqat Zaheer, and Shahid Khan. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges In Proceedings of 2012 10th International Conference on Frontiers of Information Technology (FIT). Institute of Electrical and Electronics Engineers, 2012. Yu, Tianlong, Vyas Sekar, Srinivasan Seshan, Yuvraj Agarwal, and Chenren Xu. Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (ACM)., 2015. HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. HP News, 2014. Federal Trade Commission. Internet of Things: Privacy and Security in a Connected World In FTC Staff Report., 2015. Meltzer, Joshua P.. "The Internet, Cross-Border Data Flows and International Trade." SSRN Electronic Journal (2013). Tang, Wenfang, and Shanto Iyengar. Political Communication in China: Convergence or Divergence Between the Media and Political System?. London: Routledge, 2012. Dalha, Tenzin. Assertion of China’s Sovereignty over the Internet. global-is-asian, 2018. Shahbaz, Adrian. Freedom on the Net 2018: The Rise of Digital Authoritarianism. Freedom House, 2018. Sherman, Justin. "How to Regulate the Internet Without Becoming a Dictator." Foreign Policy (2019). Saakashvili, Eduard. The Global Rise of Internet Sovereignty. .coda, 2019. Valeriano, Brandon, Benjamin Jensen, and Ryan C. Maness. Cyber Strategy: The Evolving Character of Power and Coercion. Oxford Scholarship Online, 2018. Kerttunen, Mika, and Eneken Tikk. Strategically Normative. Norms and Principles in National Cybersecurity Strategies In EU Cyber Direct., 2019. United States Cyber Command. Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command., 2018. NATO Warns Russia of ‘Full Range’ of Responses to Cyberattack. Security Week, 2019. Clarke, Richard A., and Robert K. Knake. Cyberwar: The Next Threat to National Security and What to Do About It. New York, NY: Harper Collins, 2010. Goel, Sanjay, and Hany A. Shawky. "Estimating the Market Impact of Security Breach Announcements on Firm Values." Information & Management 46, no. 7 (2009): 404-410. Clapper, James R., Marcel Lettre, and Michael S. Rogers. Joint Statement for the Record to the Senate Armed Services Committee ‘Foreign Cyber Threats to the United States’., 2017. Schaap, Arie J.. "Cyber Warfare Operations: Development and Use Under International Law." Air Force Law Review 64 (2009): 121-173. Dévai, Dóra. "Proliferation of Offensive Cyber Weapons. Strategic Implications and Non-Proliferation Assumptions." Academic and Applied Research in Military and Public Management Science (AARMS) 15, no. 1 (2016): 61-73. Leiner, Barry M.. "A Brief History of the Internet." ACM SIGCOMM Computer Com¬mu¬nication Review 39, no. 5 (2009): 22-31. Armstrong, Helen L., and Patrick J. Forde. "Internet Anonymity Practices in Computer Crime." Information Management and Computer Security 11, no. 5 (2003): 209-215. Goel, Sanjay. "Anonymity vs. Security: The Right Balance for the Smart Grid." Communications of the Association for Information Systems 36, no. Article 2 (2015): 23-32. Goel, Sanjay. "Cyberwarfare: Connecting the Dots in Cyber Intelligence." Communications of the ACM 54, no. 8 (2011): 132-140. Healey, Jason. Beyond Attribution: Seeking National Responsibility for Cyber Attacks In January Issue Brief 2012. Atlantic Council, 2012. Ahmed, Rizwan, and Rajiv V. Dharaskar. "Mobile Forensics: An Overview, Tools, Future Trends and Challenges from Law Enforcement Perspective." In 6th International Conference on E-Governance, ICEG, Emerging Technologies in E-Government, M-Government., 2008. Pages« първа ‹ предишна … 398 399 400 401 402 403 404 405 406 … следваща › последна »