Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
(active tab)
Full profile
Publications
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Defense, US Department
.
2016 Operational Energy Strategy
(link is external)
. Office of the Assistant Secretary of Defense for Operational Energy, 2016.
McEwen, Adrian
, and
Hakim Cassimally
.
Designing the Internet of Things
. Chichester, West Sussex: United Kingdom: John Wiley and Sons, 2014.
Légaré, Christian
.
Designing the Internet of Things: Part 1 — IoT Devices and Local Networks
(link is external)
. EDN Network, 2014.
Pfister, Cuno
.
Getting started with the Internet of Things
. Sebastopol, CA: O’Reilly Media, 2011.
da Costa, Francis
, and
Byron Henderson
.
Rethinking the Internet of Things - A Scalable Approach to Connecting Everything
. New York: Apress, 2014.
Gonzalez, Marcelo Hector
, and
Jana Djurica
.
"
Internet of Things Offers Great Opportunities and Much Risk
(link is external)
."
ISACA Journal
2 (2015).
Monte, Matthew
.
Network Attacks and Exploitation: A Framework
. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2015.
Dhanjani, Nitesh
.
Abusing the Internet of Things - Blackouts, Freakouts and Stakeouts
. Sebastopol, CA: O’Reilly, 2015.
Hersent, Olivier
,
David Boswarthick
, and
Omar Elloumi
.
The Internet of Things - Key Applications and Protocols
. Chichester, West Sussex,United Kingdom: John Wiley and Sons, 2012.
Jing, Qi
,
Athanasios V. Vasilakos
,
Jiafu Wan
,
Jingwei Lu
, and
Dechao Qiu
.
"
Security of the Internet of Things: perspectives and challenges
."
Wireless Networks
20, no. 8 (2014): 2481-2501.
Martin, Robert
.
"
The Internet of Things (IoT) –Removing the Human Element
(link is external)
."
Infosec Writers
(2015).
Bachmann, Sascha-Dominik
, and
Hakan Gunneriusson
.
"
Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Peace and Security
."
The Journal of Terorism and Security Analysis
(2014): 26-36.
"
The National Security Concept of the Republic of Bulgaria
."
National Security Priorities and Factors
(1998): 5.
The National Security Strategy of the Republic of Bulgaria (Sector Security Policies. Financial and Economic Security Policies)
. Approved by the National Assembly Decision of 25 February 2011, State Gazette, no. 1 ed., 2011.
Feaster, Seth W.
,
Nelson D. Schwartz
, and
Tom Kuntz
.
"
It's All Connected: A Spectators Guide to the Euro Crisis
(link is external)
."
New York Times
(2011).
Slatinski, Nickolay
.
On Five Levels of Security
. Sofia: Military publishing house, 2010.
Dobbs, Richard
,
Jonathan Woetzel
,
Susan Lund
, and
Mina Mutafchieva
.
Debt and (not much) deleveraging
(link is external)
. McKinsey Global Institute, 2015.
Yordanova, Gergana
.
Sovereign Debt Modeling Within the Context of the National Security Policy of the Republic of Bulgaria
. Vol. Dissertation. Sofia: Central Research and Technical Library, 2016.
Deriglazova, Larisa
.
"
Asymmetric character of contemporary conflicts
(link is external)
."
Geopolitics Magazine
(2010).
Christie, Paul
.
Ukraine`s fate no one cares
In
Economic Bulletin
. Bremen, Lower Saxony, Germany: Professional Public Conversation by the European, 2014.
Stanev, Zhivko
.
"
Paradigm of Geo-economics: Global Moving Power in XXI century
."
Geopolitics Magazine
3 (2006).
Cielen, Davy
,
Arno D. B. Meysman
, and
Mohamed Ali
.
Introducing Data Science: Big Data, Machine Learning, and More, Using Python Tools
. Shelter Island, NY: Manning, 2016.
Lescovec, Jure
,
Anand Rajaraman
, and
Jeffrey D. Ullman
.
Mining of Massive Datasets
. Second ed. Cambridge: Cambridge University Press, 2014.
McIlwraith, Douglas G.
,
Haralambos Marmanis
, and
Dmitry Babenko
.
Algorithms of the Intelligent Web
. Second ed. Shelter Island, NY: Manning, 2016.
Russell, Stuart
, and
Peter Norvig
.
Artificial Intelligence: A Modern Approach
. Third edition. Harlow, Essex, UK: Pearson Education, 2014.
Pages
« първа
‹ предишна
…
278
279
280
281
282
283
284
285
286
…
следваща ›
последна »
376117 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top