Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Barahona, Carolina del Rocio. Martens Clause: application in the context of Cyberwar In Facultad de Jurisprudencia. Pontificia Universidad Católica del Ecuador, 2022. K¨onig, Philip, Fabian Obermann, Kevin Mallinger, and Alexander Schatten. Root Cause Analysis of Software Aging in Critical Information Infrastructure., 2022. Lewandowsky, Stephan, and John Cook. The Conspiracy Theory Handbook. NSC OPIR, 2020. Deng, Xinyang, and Wen Jiang. "A framework for the fusion of non-exclusive and incomplete information on the basis of D number theory ." Applied Intelligence (2022). Федонюк, Сергій. Міжнародні аспекти безпеки кіберпростор. Вежа-Друк: Луцьк , 2022. Tibor, Serbakov Márton. A szélsőséges terrorista csoportok internethasználatának elemzése. Vol. PHD. Egyetem Pécsi Tudományegyetem, 2022. Petrova, Valentina Markova. Analytical hierarchical process for assessment and selection of secure software solutions. Varna, Bulgaria: Nikola Vaptsarov Naval Academy , 2022. Rana, Abhisekh, Hamdi Kavak, Andrew Crooks, Sean Luke, Carlotta Domeniconi, and Jim Jones. Mitigation of Optimized Pharmaceutical Supply Chain Disruptions by Criminal Agents In International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation., 2022. Alkan, Erkan. Birleşik Krallığın dış politikasında yumuşak güç aracı olarak burs programları. Vol. masterThesis. Batman: Batman Üniversitesi Lisansüstü Eğitim Enstitüsü, 2022. Spasic, A. J., D. S. Jankovic, P. J. Rajkovic, and D. S. Aleksic. "Programme-Sensitive Modifications of Generalized Net Model of Software-Intensive Production of Stereoscopic Multimedia Content." Journal of Computer and Systems Sciences International 61 (2022): 824-842. Альперт, Софія Іоган. "Новітній підхід до застосування теорії дезера – смарандаке при класифікуванні емляного покриву під час проведення дистанційного зондування із використанням безпілотних літальних апаратів." Управління розвитком складних систем 49 (2022). Feriz, Larisa. "Duboki" i "mračni" internet In Faculty of Humanities and Social Sciences. University of Zagreb, 2022. Hoyte, Trudee, Anil Ali, and Adilah Mahabir. "A Preliminary Study Investigating the Impact of the COVID-19 Pandemic on Dental Education in the Caribbean: A Student’s Perspective." Oral 2 (2022): 251-262. Belletti, Federico. Las operaciones de ciberguerra y su contribución al logro de los objetivos del nivel operacional: caso de estudio el accionar de Rusia contra Ucrania. Argentina: Escuela Superior de Guerra Conjunta de las Fuerzas Armadas, 2021. Chambers, Michael David. Exploring the Standards Cybersecurity Practitioners Need to Comply with Multinational Cybersecurity Requirements. Vol. Doctor of Computer Science. Colorado Technical University, 2022. Narankotuwa, Kusal Madusanka. Effects on Perceived Productivity for Remote Workplace: Case Study during the COVID-19 Pandemic In Graduate School. Kasetsart University, 2021. Aferudin, Farouq, and Kalamullah Ramli. "The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia." Budapest International Research and Critics Institute-Journal (BIRCI-Journal) 5, no. 3 (2022): 22859-22872. Sharma, Muskan. Cyber Terrorism and How Internet is Used to Propagate it In Legal Readings, "A Platform for Learning"., 2021. Hazari, Sunil. "Investigation of generational differences in advertising behaviour and fake news perception among Facebook users ." Int. J. Internet Marketing and Advertising 17, no. 1/2 (2022). Poškus, Armandas. Kibernetinio saugumo galimybių tyrimas. Vol. Bakalauro. Vilnius: Generolo Jono Žemaičio Lietuvos karo akademija, 2022. Ansari, Meraj Farheen, Bibhu Dash, Pawankumar Sharma, and Nikhitha Yathiraju. "The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review." International Journal of Advanced Research in Computer and Communication Engineering 11, no. 9 (2022). Dash, Bibhu, Meraj Farheen Ansari, Pawankumar Sharma, and Azad Ali. "Threats and opportunities with ai-based cyber security intrusion detection: a review." International Journal of Software Engineering & Applications (IJSEA) 13, no. 5 (2022). Turlubekova, Zhaniya. "Pushed against the Wall: The Fight against Drug-Related Corruption in Kazakhstan." Communist and Post-Communist Studies 55, no. 3 (2022): 119-139. Trauthig, Inga K., Katlyn Glover, Zelly Martin, Anastasia Goodwin, and Samuel Woolley. Polarized Information Ecosystems and Encrypted Messaging Apps: Insights into Egypt, Ethiopia, and Libya. Center for Media Engagement Moody College of Communication The University of Texas at Austin, 2022. Simeon, Lesley Amol. "The Human Rights Oversight in Ensuring Energy Security." PDEU Journal of Energy and Management 5, no. 1-2 (2020). Pages« първа ‹ предишна … 509 510 511 512 513 514 515 516 517 … следваща › последна »