Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Monaghan, Andrew
.
"
The ‘War’ in Russia’s ‘Hybrid Warfare
."
Parameters
45, no. 4 (2015): 65-74.
Roberts, Brad
.
Asymmetric Conflict 2010
. Alexandria, VA: Institute for Defense Analysis, 2000.
Sazonov, Vladimir
,
Kristiina Müür
, and
Holger Mölder
.
Russian Information Campaign Against the Ukrainian State and Defence Forces
. Tartu: NATO Strategic Communications Centre of Excellence and Estonian National Defence College, 2016.
Lange-Ionatamišvili, Elīna
.
Redefining Euro-Atlantic Values: Russia’s Manipulative Techniques
. Riga: NATO Strategic Communications Centre of Excellence, 2016.
Ingram, Haroro J.
.
"
Three traits of the Islamic State’s information warfare
."
The RUSI Journal
159, no. 6 (2014): 4-11.
Ronald Inglehart and Pippa Norris, “Trump, Brexit, and the Rise of Populism: Economic Have-nots and Cultural Backlash
In
HKS Working Paper
. Harvard: Harvard Kennedy School, 2016.
Chekinov, Sergey G.
, and
Sergey A. Bogdanov
.
"
The Nature and Content of a New-Generation War
."
Military Thought
, no. 4 (2013): 12-23.
Danyk, Yuriy G.
,
D. Ishchenko
, and
O. Manko
.
"
Military Aspects of Advanced Technological Systems’ Classification
."
S.Korolov Zhytomyr Military Institute Scientific Journal
8 (2013): 5-13.
Danyk, Yuriy G.
, and
O.O. Trush
.
"
Specifics of Supporting National Security in an Environment of Advanced Technologies
."
Government’s Organization
1 (2010).
Deptula, David A.
, and
James R. Marrs
.
"
Global Distributed ISR Operations: The Changing Face of Warfare
."
Joint Force Quarterly
54 (2009): 110-115.
Rappert, Brian
.
Non-lethal Weapons as Legitimizing Forces? Technology, Politics, and the Management of Conflict
. Abingdon, UK: Routledge, 2003.
Hoffman, Frank G.
.
"
Complex Irregular Warfare: The Next Revolution in Military Affair
."
Orbis
50, no. 3 (2006): 395-411.
Madden, Dan
,
Dick Hoffmann
,
Michael Johnson
,
Fred Krawchuk
,
John E. Peters
,
Linda Robinson
, and
Abby Dol
.
Special warfare: The Missing Middle in US Coercive Options
. Santa Monica, CA: RAND, 2014.
Duggan, Patrick M.
.
"
Strategic Development of Special Warfare in Cyberspace
."
Joint Force Quarterly
79 (2015).
Telelim, Vasyl M.
,
D.P. Muzychenko
, and
Yu.V. Punda
.
"
Force Planning for the ‘Hybrid War’ Scenarios
."
Science and Defense
20, no. 3 (2014): 30-35.
InfoStream – News Monitoring Technology
., 2017.
Stoycheff, Elizabeth
, and
Erik C. Nisbet
.
"
Priming the Costs of Conflict? Russian Public Opinion About the 2014 Crimean Conflict
."
International Journal of Public Opinion Research
(2016): edw020.
Black List of the Ukrainian Army
. TV Program on the First National TV channel of Ukraine, 2017.
Gürer, Cüneyt
.
"
Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism
."
Connections: The Quarterly Journal
16, no. 2 (2017): 41-57.
OSINT Summary: Vehicle impact attack on Berlin Christmas market highlights in-creasing adoption of tactic
. IHS Jane's Terrorism & Insurgency Monitor, 2016.
Frankfurt Airport shooting: two US-serviceman dead
. BBC News online, 2011.
Frankfurt airport gunman jailed for life
. BBC News online, 2012.
Berlin truck attack: Can the EU stop another Amri?
. BBC News online, 2017.
The Berlin Vehicular Ramming Attack – What we know & Insights from ICT Experts
. The International Institute for Counter-Terrorism (ICT) online, 2016.
online, Der Tagesspieg
.
Gegen Terrorismus hilft nur Besonnenheit
. Vol. February 2, 2017., 2017.
Pages
« първа
‹ предишна
…
215
216
217
218
219
220
221
222
223
…
следваща ›
последна »
374792 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance