Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Hrytsyuk, Y.I.
, and
T.E. Rak
.
"
The Training Problem of Information Security Specialists for the Ministry of Emergencies of Ukraine
." In
Intelligent Decision-making Systems and Problems of Computational Intelligence
, 272-276. Yevpatoria: Kherson, 2011.
Website of the national Tempus/Erasmus+ office in Ukraine
., 2016.
Tarasyuk, O.M.
, and
A.V. Gorbenko
.
"
For Methods for Development of Critical Software
." In
Lecture Materials
. Kharkiv: National Aerospace University Institute “KhAI”, 2009.
Website of the System Programming Department. Khmelnytskyi National University
., 2016.
Monin, Jean François
, and
Michael G. Hinchey
.
Understanding Formal Methods
. Springer, 2003.
Romanovsky, Alexander
.
"
Deployment of Formal Methods in Industry: the Legacy of the FP7 ICT DEPLOY Integrated Project
."
ACM SIGSOFT Software Engineering Notes
37, no. 5 (2012): 1-4.
Almeida, José Bacelar
,
Maria João Frade
,
Jorge Sousa Pinto
, and
Simão Melo de Sousa
.
"
An Overview of Formal Methods Tools and Techniques
." In
Rigorous Software Development: An Introduction to Program Verification
, 15-44. London, 2011.
Hinchey, Michael G.
,
Jonathan P. Bowen
, and
Emil Vassev
.
"
Formal Methods
." In
Encyclopedia of Software Engineering, ed. Philip A. Laplante
, 308-320. Taylor & Francis, 2010.
Laprie, Jean-Claude
.
"
From Dependability to Resilience
." In
38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
. Anchorage, USA, 2008.
Neches, Robert
.
Engineered Resilient Systems (ERS)
. S&T Priority Description and Roadmap, 2011.
Reder, Leonard
,
John Day
,
Mitch Ingham
,
Richard Murray
, and
Brian Williams
.
Engineering Resilient Space Systems: Introduction to Short Course
. Pasadena, CA: Keck Institute for Space Studies, 2012.
Tyugu, Enn
.
Artificial Intelligence in Cyber Defense
In
Proceedings of the Third International Conference on Cyber Conflict, ed. C. Czosseck, E. Tyugu, T. Wingfield
. Tallinn: CCD COE, 2011.
Bitter, Christian
,
David A. Elizondo
, and
Tim Watson
.
"
Application of Artificial Neural Networks and Related Techniques to Intrusion Detection
." In
The 2010 International Joint Conference on Neural Networks (IJCNN)
., 2010.
Wing, Jeannette M.
.
A Symbiotic Relationship Between Formal Methods and Security
In
Computer Security, Dependability and Assurance: From Needs to Solutions, Proceedings
. IEEE, 1998.
Mansour, Riham Hassan Abd
.
Formal Analysis and Design for Engineering Security (FADES)
. Vol. PhD Dissertation. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2009.
Nakagawa, Hiroyuki
,
Kenji Taguchi
, and
Shinichi Honiden
.
Formal Specification Generator for KAOS: Model Transformation Approach to Generate Formal Specifications from KAOS Requirements Models
In
Proceedings of the Twenty-second IEEE/ACM International Conference on Automated Software Engineering
. Atlanta, GA, 2007.
Schneider, Steve
.
The B-Method: An Introduction
. Basingstoke, UK: Palgrave, 2001.
van Lamsweerde, A.
.
Elaborating Security Requirements by Construction of Intentional Anti-Models
In
Proceedings of the 26th International Conference on Software Engineering, ICSE 2004
., 2004.
Dai, Lirong
, and
Kendra Cooper
.
"
A Survey of Modelling and Analysis Approaches for Architecting Secure Software Systems
."
International Journal of Network Security
5, no. 2 (2007): 187-198.
Heitmeyer, Constance L.
,
Myla M. Archer
,
Elizabeth I. Leonard
, and
John D. McLean
.
"
Applying Formal Methods to a Certifiably Secure Software System
."
IEEE Transactions on Software Engineering
34, no. 1 (8): 82-97.
Heitmeyer, Constance
,
Myla Archer
,
Ramesh Bharadwaj
, and
Ralph Jeffords
.
"
Tools for Constructing Requirements Specifications: The SCR Toolset at the Age of Ten
."
Computer Systems Science & Engineering
20, no. 1 (2005): 19-35.
Older, Susan
, and
Shiu-Kai Chin
.
"
Formal Methods of Assuring Security of Protocols
."
The Computer Journal
45, no. 1 (2002): 46-54.
Mossakowski, Till
, and
Markus Roggenbach
.
Structured CSP – A Process Algebra as an Institution
In
Recent Trends in Algebraic Development Techniques
. Berlin, Heidelberg: Springer, 2007.
Madeira, Pedro Miguel dos
.
Formal Methods for the Analysis of Security Protocols
. Vol. PhD Dissertation. Lisbon: Instituto Superior Tėcnico, Universidade Tecnica de Lisboa, 2006.
Blanchet, Bruno
.
"
Using Horn Clauses for Analyzing Security Protocols
." In
Formal Models and Techniques for Analyzing Security Protocols
, 86-111. Amsterdam: IOS Press, 2011.
Pages
« първа
‹ предишна
…
209
210
211
212
213
214
215
216
217
…
следваща ›
последна »
374824 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance