Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
(active tab)
Full profile
Publications
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
SysSec Network of Excellence Home Page
(link is external)
., 2015.
Balzarotti, Davide
, and
Evangelos Markatos
.
The Red Book – A Roadmap for Systems Security Research
(link is external)
. SysSec Consortium, 2013.
Cybersecurity in 2015: What to expect?
(link is external)
In
2015 Global Megatrends in Cybersecurity
. ZDNET, 2014.
Thompson, K. K.
.
"
Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate
." In
Texas Law Review
, 465-495. Vol. 90., 2011.
House, White
.
Securing Cyberspace – President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts
(link is external)
In
The White House
., 2015.
Newmeyer, K.
.
Cybersecurity and the 2015 State of the Union Address. Cyber Experts Blog at National Cybersecurity Institute
(link is external)
., 2015.
Newmeyer, K.
.
Cybersecurity in the President’s National Security Strategy. Cyber Experts Blog at National Cybersecurity Institute
(link is external)
., 2015.
Sylvertooth, R.
.
Government Cyber Agency Will Be Here Shortly! Cyber Experts Blog at National Cybersecurity Institute
(link is external)
., 2015.
Hudson, D.
.
President Obama Speaks at the White House Summit on Cybersecurity and Consumer Protection. The White House Blog.
(link is external)
., 2015.
Newmeyer, K.
.
Executive Order on Cybersecurity: Billion-Dollar Bank Heist. Cyber Experts Blog at National Cybersecurity Institute
(link is external)
., 2015.
Office, Department for Educat
.
How social media is used to encourage travel to Syria and Iraq briefing note for school
(link is external)
., 2015.
B., Jenkins
.
International Terrorism
. Los Angeles, 1975.
A.P., Schmid
.
Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review
. Hague: International Centre for Counter-Terrorism Research Paper, 2003.
Ashour, O.
.
The De-Radicalization of Jihadists: Transforming armed Islamist movements, Routledge
. London, 2009.
J., Sinai
.
"
Radicalization into Extremism and Terrorism
."
Intelligencer: Journal of U.S. Intelligence Studies
19, no. 2 (2012).
A.P., Schmid
.
Glossary and Abbreviations of Terms and Concepts Relating to Terrorism and Counter-Terrorism
. London: Routledge, 2011.
G., Weimann
.
The Internet as a Terrorist Tool to Recruit Youth
. Arlington: Youth Recruitment & Radicalization Roundtable, 2009.
London, King’s College
.
Recruitment and Mobilization for the Islamist Militant Movement in Europe
. London: King’s College, 2007.
A., Kaczynski
.
8 Ways Terrorists Use the Internet for Recruitment
(link is external)
., 2014.
J.M., Berger
.
How ISIS Games Twitter
(link is external)
., 2014.
The Terrorist’s Handbook
(link is external)
., 2005.
Powell, William
.
The Anarchist Cookbook
. Barricade Books, 2002.
Aziz, Abdel –
.
The Mujahideen Poisons Handbook
(link is external)
., 2004.
,
Stephen R.B.
, and
Valeria C.
.
"
The Encyclopedia of Jihad
." Faculty Publications and Presentations, Liberty University, 2001.
M., Alexei
,
Stephen R.B.
, and
Valeria C.
.
"
The Encyclopedia of Jihad
." Faculty Publications and Presentations, Liberty University, 2001.
Pages
« първа
‹ предишна
…
175
176
177
178
179
180
181
182
183
…
следваща ›
последна »
380570 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top