Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Hryshchuk, Ruslan
, and
Katerina Molodetska-Hrynhchuk
.
"
Methodological Foundation of State’s Information Security in Social Networking Services in Conditions of Hybrid War
."
Information & Security: An International Journal
41 (2018): 61-79.
Schneider, Tina
.
"
Responsibility for private sector adaptation to climate change
."
Ecology and Society
19, no. 2 (2014): 8.
Savchuk, Vlada
.
"
Graphic Model of The Target Audience of Psychological Influence in Social Networks
."
Information & Security: An International Journal
41 (2018): 81-93.
Ponder, Sarah
, and
Jonathan Matusit
.
"
Examining ISIS Online Recruitment through Relational Development Theory
."
Connections: The Quarterly Journal
16, no. 4 (2017): 35-50.
Nasirov, Elman
, and
Khayal Iskandarov
.
"
The Prospects of Azerbaijan to Enhance Military Interoperability with NATO
."
Connections: The Quarterly Journal
16, no. 4 (2017): 89-99.
Kaura, Vinay
.
"
India’s Counter-Terrorism Policy against Jihadist Terror: Challenges and Prospects
."
Connections: The Quarterly Journal
16, no. 4 (2017): 51-67.
Nicolson, Dasha
.
"
Foreign Terrorist Fighters from the North Caucasus: Understanding Islamic State Influence in the Region
."
Connections: The Quarterly Journal
16, no. 4 (2017): 69-88.
Chincholkar, Y. D.
, and
Ayush Kumar
.
"
Traffic Sign Board Detection for Advanced Driver Assistance Systems and Autonomous Vehicles
."
Automation and Autonomous System
10, no. 6 (2018).
Chincholkar, Y. D.
, and
Ayush Kumar
.
"
Traffic Sign Board Detection for Advanced Driver Assistance Systems and Autonomous Vehicles
."
Automation and Autonomous System
10, no. 6 (2018).
Selvi, P.Pandi
, and
T.Meyyappan
.
"
A New Approach for the Recognition of Characters from Vehicle Number Plate Images using K Nearest Neighbor Classifier and Enhanced Artificial Neural Network
."
International Journal of Pure and Applied Mathematics
118, no. 7 (2018).
Shires, James
.
"
Enacting Expertise: Ritual and Risk in Cybersecurity
."
Politics and Governance
6, no. 2 (2018): 31-40.
Bossong, Raphael
.
"
Critical Infrastructure and Critical Information Infrastructure Protection: The Hew Frontier of EU Internal Security
." In
Challenges and Critiques of the EU Internal Security Strategy: Rights, Power and Security
. Cambridge, 2017.
Tag Archives: technology
. ATW Learn, Wordpress.com, 2012.
Kovačević, Božo
.
"
Cyberwar – Američka Izlika za Novi Hladni Rat?
"
Polemos
16, no. 2 (2013): 91-110.
Bossong, Raphael
.
"
The European Programme for the protection of critical infrastructures–meta-governing a new security problem?
"
European Security
23, no. 2 (2014).
Read, Oliver
.
"
How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage
." In
Cyberspace and International Relations
, 203-230 . Berlin, Heidelberg : Springer, 2014.
Soyer, Hubert
.
"
Internet Science Risk, Risk Perception, and Cyberwar
."
Network Architectures and Services
(2013).
Lawson, Sean
.
"
Putting the “war” in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States
."
First Monday
17, no. 7 (2012): 49-73.
Satija, Siddhant
, and
Prabhakar Shukla
.
"
Consumer Behaviour and Adoption of M-Commerce
."
AGU International Journal of Management Studies & Research
6 (2018).
Fariborzi, Elham
, and
Hoda Anvari Kazemabad
.
"
The Security of Information in Financial Transactions via Mobile: Algorithms
."
International Journal of Computer Networks and Communications Security
1, no. 6 (2013): 257-263.
de Amorim, Wellyngton Silva
,
Isabela Blasi Valduga
,
João Marcelo Pe Ribeiro
,
Victoria Guazzelli Williamson
,
Grace Ellen Krauser
,
Mica Katrina Magtoto
, and
José Baltazar S. Guerra
.
"
The nexus between water, energy, and food in the context of the global risks: An analysis of the interactions between food, water, and energy security
."
Environmental Impact Assessment Review
72 (2018): 1-11.
Rogito, Pauline Kemunto
.
Multi-Tiered Security Architecture for Information Infrastructure Protection in Selected Commercial Banks in Kenya
In
School of Science and Technology
. Vol. Master of Science in Information Systems and Technology. Africa: United States International University, 2017.
Setiawan, Ahmad Budi
.
"
Peningkatan Keamanan Supervisory Control and Data Acquisition (Scada) Pada Smart Grid Sebagai Infrastruktur Kritis
."
Jurnal Penelitian Pos & Informatika
6, no. 1 (2016).
Setiawan, Ahmad Budi
.
"
Kajian Strategi Pengamanan Infrastruktur Sumber Daya Informasi Kritis
."
Buletin Pos dan Telekomunikasi
13, no. 1 (2015): 43-60.
Nagyfejeo, Eva
.
"
Transatlantic collaboration in countering cyberterrorism
." In
Terrorism Online: Politics, Law and Technology
., 2015.
Pages
« първа
‹ предишна
…
290
291
292
293
294
295
296
297
298
…
следваща ›
последна »
372903 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance