Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Zenebe, Azene
, and
David Anyiwo
.
Virtual Lab for Information Assurance Education
. CISSE, 2010.
Villanueva, Benjamin
, and
Brett Cook
.
Providing Students 24/7 Virtual Access and Hands-On Training Using VMWare GSX Server
. SIGUCCS'05, 2005.
Anderson, Benjamin R.
,
Amy K. Joines
, and
Thomas E. Daniels
.
Xen Worlds: Leveraging Virtualization in Distance Education
. ITiCSE'09, 2009.
Border, Charles
.
The Development and Deployment of a Multi-User, Remote Access Virtualisation System for Networking, Security, and System Administration Classes
. SIGCSE, 2007.
Powell, Valerie J. H.
,
Christopher T. Davis
,
Randall S. Johnson
,
Peter Y. Wu
,
John C. Turchek
, and
Ian W. Parker
.
VLabNet: The Integrated Design of Hands-on Learning in Information Security and Networking
. InfoSecCD, 2007.
Armitage, William D.
,
Alessio Gaspar
, and
Matthew Rideout
.
A UML and MLN Based Approach to Implementing a Networking Laboratory on a Scalable Linux Cluster
. CCSC'07, 2007.
Kneale, Bruce
,
Ain Y. De Horta
, and
Hona Box
.
VELNET (Virtual Environment for Learning Networking)
. ACE2004, 2004.
Krishna, Kumar
,
Weiqing Sun
,
Pratik Rana
,
Tianning Li
, and
R Sekar
.
V-NetLab: Cost-Effective Platform to Support Course Projects in Computer Society
. CISSE, 2008.
Galan, Fermin
,
David Fernandez
,
Walter Fuertes
,
Miguel Gomez
, and
Jorge E. Lopez de Vergara
.
Scenario-based Virtual Network Infrastructure Management in Research and Educational Testbeds with VNUML
. TELECOM, 2009.
Open Cyber Challenge Platform
., 2015.
OWASP Security Shepherd
., 2015.
About Cyber Security Challenge UK
. CESG, 2015.
Cyber Security Challenge UK
., 2014.
The UCSB iCTF Competition
. UCSB, 2015.
Vigna, Giovanni
,
Kevin Borgolte
,
Jacopo Corbetta
,
Adam Doupe
,
Yanick Fratantonio
,
Luca Invernizzi
,
Dhilung Kirat
, and
Yan Shoshitaishvili
.
The Years of iCTF: The Good, The Bad, and The Ugly
. 3GSE, 2014.
Air Force Association
.
CyberPatriot
., 2013.
Fuertes, W
,
J E. Lopez de Vergara
, and
F Meneses
.
Educational Platform using Virtualization Technologies: Teaching-Learning Applications and Research Use Cases
. ACE II, 2006.
Hronologija Reforme Sektora Bezbednosti u Republici Srbiji 2000–2008
. Beograd: Centar za civilno-vojne odnose, 2009.
Alutaibi, Khaled Shuraem
.
Critical Infrastructure Protection in Saudi Arabia: A Case Study on Petrochemical Industry Protection Against Terrorist Attacks at Jubail Industrial City
. Dhahran, Saudi Arabia: King Fahd University of Petroleum & Minerals, 2009.
Hadji-Janev, Metodi
.
"
Threats to the Critical Infrastructure in South-East Europe posed by Al Qaeda and its Associated Movements: the case of Macedonia
." In
Counterterrorism challenges regarding the Critical Infrastructure protection
. Center for Civil - Military Relation, Monterey, USA, Ljubljana, Slovenia , 2011.
Stecher, Tina
.
Pathways to Regional Resilience
In
The Governance of Adaptation
., 2012.
.
Захист критичної інфраструктури:Проблеми та перспективи впровадження в Україні
. Київ:: НІСД, 2012.
Redden, Shari Lynn
.
The Effectiveness of Combining Simulation and Role Playing in Nursing Education
. Walden University, 2015.
Стойков, Стойко
.
Стратегически мениджмънт на знанието в системата за сигурност и отбрана
. София: Институт Общество на знанието, 2012.
Цветков, Георги Младе
.
Формиране на отбранителната политика на Република България (1990-2010)
. София: ВА "Г.С. Раковски", , 2014.
Pages
« първа
‹ предишна
…
160
161
162
163
164
165
166
167
168
…
следваща ›
последна »
379907 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance