Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Samuilova, Simona. "Disinformation in the Ideological Race during the Cold War and its Heritage." Bulgarian Historical Review / Revue Bulgare d'Histoire 1-2 (2018): 155-178. Vona, Simone. La Russia in Guerra. Vol. tesi di laurea. Università del Piemonte orientale, 2016. Afeltowicz, Łukasz, and Krzysztof Pietrowicz. Solutionist interventions and their unforeseen consequences: a preliminary catalogue of often commited errors In 2018 II National Interdisciplinary Scientific Conference TechSpo’18: Power of Algorithms. Krakow, Poland , 2018. Breitenbauch, Henrik, and Niels Byrjalsen. "Subversion, Statecraft and Liberal Democracy." Survival Global Politics and Strategy 61, no. 4 (2019). Odunuga, Sesan Adeolu. Soft-Containment and Politics of Relevance. Conceiving a New Dimension of EU-Russia Relations In Scientific Study. GRIN Verlag, 2018. Xia, Yiping, Josephine Lukito, Yini Zhang, Chris Wells, Sang Jung Kim, and Chau Tong. "Disinformation, performed: self-presentation of a Russian IRA account on Twitter." Publication Cover Journal Information, Communication & Society 22, no. 11 (2019). Asghar, Muhammad Rizwan, Qinwen Hu, and Sherali Zeadally. "Cybersecurity in Industrial Control Systems: Issues, Technologies, and Challenges." Computer Networks 165 (2019): 106946. Che, Liang, Xuan Liu, and Zuyi Li. "Fast Screening of High-Risk Lines under False Data Injection Attacks." IEEE Transactions on Smart Grid 10, no. 4 (2019): 4003-4014. Svilicic, Boris, Junzo Kamahara, Jasmin Celic, and Johan Bolmsten. "Assessing Ship Cyber Risks: A Framework and Case Study of ECDIS Security." WMU Journal of Maritime Affairs 18, no. 3 (2019): 509-520. MAGERIT version 3: Methodology of Analysis and Risk Management Information Systems. Madrid: Ministry of Finance and Public Administration, 2012. Risk management – Principles and Guidelines In ISO ., 2009. Information technology – Security techniques – Information Security Risk Management., 2008. NIST. Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy In NIST Special Publication. Gaithersburg, MD: National Institute of Standards and Technology , 2018. "Council Directive 2008/114/EC of 8 December 2008 on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection." Official Journal L 345 (2008): 75-82. Universal Task List. Vol. version 2.1. Washington, D.C.: U.S: Department of Homeland Security, 2005. Caudle, Sharon L.. "Homeland Security Capabilities-Based Planning: Lessons from the Defense Community." Homeland Security Affairs 1, no. 2 (2005). "Capability-Based Planning." In The TOGAF® Standard. Vol. Version 9.2., 2008. Shoemaker, Dan, Anne Kohnke, and Ken Sigler. A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce 2.0 . Boca Raton, FL: CRC Press, 2016. "Integrating the Disaster Risk Management Cycle." In Science for DRM 2020: Acting Today, Protecting Tomorrow. Ispra, Italy: Disaster Risk Management Knowledge Centre, 2020. ISO/IEC. Information technology – Security techniques – Information security management systems – Requirement., 2013. Ganin, Alexander A., Phuoc Quach, Mahesh Panwar, Zachary A. Collier, Jeffrey M. Keisler, Dayton Marchese, and Igor Linkov. "Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management." Risk Analysis 40, no. 1 (2020): 183-199. Council, National Research. Review of the Department of Homeland Security’s Approach to Risk Analysis. Washington, DC: The National Academies Press, 2010. Simmons, Chris, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, and Qishi Wu. AVOIDIT: A Cyber Attack Taxonomy In Technical Report. University of Memphis, 2009. ENISA’s Threat Taxonomy., 2016. Common Language Security Incident Taxonomy., 2020. Pages« първа ‹ предишна … 404 405 406 407 408 409 410 411 412 … следваща › последна »