Philip Spassov

Introduction

Short CV

Insert CV here

Full profile

This is the longer CV, presenting education, work experience, etc.

Publications
Lawford, Mark, and Alan Wassyng. "Formal Verification of Nuclear Systems: Past, Present, and Future." Information & Security: An International Journal 28, no. 2 (2012): 223-235.
Kharchenko, Vyacheslav, and Eugene Brezhnev. "Formalizing Power Grid Influence to Assess the Safety of Nuclear Power Plants." Information & Security: An International Journal 28, no. 1 (2012): 65-78.
Tverdokhlebov, Vladimir. "Identifying the Reasons for Failures in Large-Scale Systems." Information & Security: An International Journal 28, no. 2 (2012): 236-247.
Gorbenko, Anatoliy, Vyacheslav Kharchenko, Olga Tarasyuk, and Alexander Romanovsky. "Intrusion-Avoidance via System Diversity." Information & Security: An International Journal 28, no. 1 (2012): 154-158.
Ivanchenko, Oleg, Vyacheslav Kharchenko, and Aleksandr Skatkov. "Management of Critical Infrastructures Based on Technical Megastate." Information & Security: An International Journal 28, no. 1 (2012): 37-51.
Potij, Alexandr, Dmitrij Komin, and Inna Rebriy. "A Method of Evaluating Assurance Requirements." Information & Security: An International Journal 28, no. 1 (2012): 108-120.
Netkachova, Kateryna. "Model and Implementation of Safety Case Cores." Information & Security: An International Journal 28, no. 2 (2012): 286-295.
Biryukov, Andriy, Oleksandr Gordieiev, and Oleksandr Yakimenko. "On the Necessity to Create a National Processing Centre." Information & Security: An International Journal 28, no. 2 (2012): 266-272.
Procházková, Dana. "Overview of Fine Exact Methods of Safety Engineering." Information & Security: An International Journal 28, no. 2 (2012): 167-178.
Androulidakis, Iosif. "PRETTY (Private Telephony Security) - Securing the Private Telephony Infrastructure." Information & Security: An International Journal 28, no. 1 (2012): 89-97.
Procházková, Dana. "Principles of Mitigating and Managing Human System Risks." Information & Security: An International Journal 28, no. 1 (2012): 21-36.
Lysenko, Sergiy, and Oleg Savenko. "Software for Computer Systems Trojans Detection as a Safety-Case Tool." Information & Security: An International Journal 28, no. 1 (2012): 121-132.
Melenets, Andrey. "The State Corporate Cloud Computing- Based Network for Registration of Potentially Dangerous Objects." Information & Security: An International Journal 28, no. 1 (2012): 52-62.
Gorbenko, Anatoliy, Vyacheslav Kharchenko, Olga Tarasyuk, and Sergiy Zasukha. "A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009." Information & Security: An International Journal 28, no. 2 (2012): 179-198.
Volkoviy, Andriy, and Ilya Tikhov. "Use of Mobile Applications in Security and Safety Systems." Information & Security: An International Journal 28, no. 1 (2012): 146-153.
Milina, Velichka. New Trends in the Policies for Security of Critical Energy Infrastructures In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2013.
Georgiev, Venelin. Strategy Maps and Balanced Scorecard - used for Assessing the Activities of the Entities in the BAS In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2013.
Monitor, ISIJ. "Acronyms." Information & Security: An International Journal 29, no. 2 (2013): 185-188.
Tagarev, Todor, and Petya Ivanova. "Analytical support to foresighting EU roles as a Global Security Actor." Information & Security: An International Journal 29, no. 1 (2013): 21-33.
Nerlich, Uwe. "Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider?" Information & Security: An International Journal 29, no. 1 (2013): 77-87.
López, David, and Oscar Pastor. "Comprehensive Approach to Security Risk Management in Critical Infrastructures and Supply Chains." Information & Security: An International Journal 29, no. 1 (2013): 69-76.

Pages

Last updated: Monday, 01 December 2014