Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Benoudnine, Hadjira
,
Abdelkrim Meche
,
Mokhtar Keche
,
Abdelaziz Ouamri
, and
Malcolm S. Woolfson
.
"
Real time Hough transform based track initiators in clutter
."
Information Sciences
337–338 (2016): 82-92.
Mirzaei, Majid
,
Mina Faghih
,
Tan Pei Ying
,
Ahmed El-Shafie
,
Yuk Feng Huang
, and
Juneseok Lee
.
"
Application of a rainfall-runoff model for regional-scale flood inundation mapping for the Langat River Basin
."
Water Practice and Technology
11, no. 2 (2016): 373-383.
Hofmann, Marko A.
.
Reasoning beyond predictive validity: the role of plausibility in decision-supporting social simulation
In
WSC '15 Proceedings of the 2015 Winter Simulation Conference
. Huntington Beach, California, 2015.
Hawkins, Timothy G.
,
Wesley S. Randall
,
Adam V. Coyne
, and
Mohammad H. Baitalma
.
"
Sustainable integrity: how reverse auctions can benefit suppliers in emerging markets
."
Supply Chain Management: An International Journal
19, no. 2 (2014): 126-141.
Beaula, Thangaraj
, and
J.Partheeban
.
"
Risk Assessment of Natural Hazards in Nagapattinam District Using Fuzzy Logic Model
."
International Journal of Fuzzy Logic Systems (IJFLS)
3, no. 3 (2013).
Krishna, Varanasi Vamsi
,
Krishna B. Reddy
,
Madhukar R. Vishnu
, and
P Saha
.
"
Disaster Management: Focusing on Earthquakes
."
International Journal of Advance Research, IJOAR
1, no. 3 (2013).
Tripathi, Jay Ganesh
.
"
Distance Learning Courses become more popular in rural areas then urban areas?
"
International Journal of Scientific Research
2, no. 3 (2014): 674-678.
Arisawa, Hiroshi
, and
Takako Sato
.
"
Development of Interactive Multimedia Education System (IMES) as an International Education Platform
." In
ustainable Living with Environmental Risks
. Tokyo : Springer, 2014.
Pohjus, Merja
.
Collaborative Web-Based Course To Learn Military English Vocabulary on the FDFMoodle platform: How can collaboration based on the KATRIKS-model in military pedagogy be integrated into the course?
In
Department of Languages - English
. Vol. Master. University of Jyväskylä , 2014.
Simsek, Mehmet
, and
Pakphum Phairotchananan
.
A comparison of transparency in the defense procurement processes of Turkey and Thailand
. Monterey, California: Naval Postgraduate School, 2014.
Padmadas, M.
,
Krishnan Nallaperumal
,
V. Mualidharan
, and
P. Ravikumar
.
A deployable architecture of Intelligent Transportation System — A developing country perspective
In
IEEE International Conference on Computational Intelligence and Computing Research
. Coimbatore, India : IEEE , 2010.
Babin, Ivan A.
,
Anton Chablin
,
Aleksei Kazantsev
,
Mohammed A. Khesham
,
Yuri V. Vasiliyev
, and
Frederic Labarre
.
"
Countering Radicalism in the North Caucasus
."
Connections: The Quarterly Journal
17, no. 2 (2018): 61-76.
Penev, Plamen P.
.
"
Peacemakers: American Leadership and the End of Genocide in the Balkans (book review)
."
Connections: The Quarterly Journal
17, no. 1 (2018): 77-83.
Bailes, Alyson J. K.
.
"
Societal security and small states
." In
Small States and International Security: Europe and Beyond
. New York: Routledge, 2014.
Najjar, Mohannad
.
"
New Technique to Insure Data Integrity for Archival Files Storage (DIFCS)
."
(IJACSA) International Journal of Advanced Computer Science and Applications
5, no. 2 (2014).
Liu, Yanjun
.
"
A Secure and Efficient t-out-of-n Oblivious Transfer Based on the Generalized Aryabhata Remainder Theorem
."
Journal of Information Hiding and Multimedia Signal Processing
5, no. 2 (2014).
López-García, Lourdes
,
Luis J. Domingu Perez
, and
Francisco Rodríguez-Henríquez
.
"
A Pairing-Based Blind Signature E-Voting Scheme
."
The Computer Journal
57, no. 10 (2014): 1460-1471.
Hsu, Chien-Lung
, and
Yu-Li Lin
.
"
Improved migration for mobile computing in distributed networks
."
Computer Standards & Interfaces
36, no. 3 (2014): 577-584 .
Zakerolhosseini, Ali
, and
Morteza Nikooghadam
.
"
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
."
Wireless Personal Communications
70, no. 2 (2013): 641-656.
Moeller, Robert R.
.
IT Audit, Control, and Security (Wiley Corporate F&A)
. Hoboken, New Jersey: John Wiley and Sons, 2010.
Chim, William
.
"
Russia’s Digital Awakening
."
Connections: The Quarterly Journal
17, no. 2 (2018): 5-17.
Roloff, Ralf
, and
Pàl Dunay
.
"
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank
."
Connections: The Quarterly Journal
17, no. 2 (2018): 19-35.
Flores-Herrera, Albert
, and
Plamen P. Penev
.
"
The importance of the Council of Europe’s 24/7 Network of Contact Points on Foreign Terrorist Fighters
."
Connections: The Quarterly Journal
17, no. 2 (2018): 37-45.
Branch, Anthony R.
.
"
Armenia and the South Caucasus: A New Security Environment
."
Connections: The Quarterly Journal
17, no. 2 (2018): 47-60.
Howcroft, James
.
"
The Future of Terrorism: The Practitioners’ View
."
Connections: The Quarterly Journal
17, no. 2 (2018): 77-81.
Pages
« първа
‹ предишна
…
306
307
308
309
310
311
312
313
314
…
следваща ›
последна »
372734 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance