Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Jones, Synthia S.
,
Bernard Flowers
, and
Karlton D. Johnson
.
To Wield Excalibur: Seeking Unity of Effort in Joint Information Operations
. Joint Forces Staff College, Joint and Combined Staff Officer School, 2002.
Technology in the 21st Century
. WordPress.com, 2012.
Hai-Jew, Shalin
.
"
Inducing Six-Word Stories From Curated Text Sets to Anticipate Cyberwar in 4IR
." In
Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution
. IGI Global, 2018.
Ampofo, Lawrence Peter
.
Terrorism 3.0: Understanding Perceptions of Technology, Terrorism and Counter-Terrorism in Spain
In
Department of Politics and International Relations
. Vol. D. Phil in Politics and International Relations. London: Royal Holloway University of London, 2011.
Ehrhart, Hans-Georg
,
Hendrik Hegemann
, and
Martin Kahl
.
Putting security governance to the test
. London: Routledge, 2015.
Hughes, Dan
.
A discourse in conflict: resolving the definitional uncertainty of cyber war
In
Master of Arts in Defence and Security Studies
. Albany, New Zealand: Massey University, 2017.
Williams, Crystal D.
.
The socialization of secure computing practices for home internet users: A quantitative analysis of individual perceptions
. Vol. Doctor of Philosophy. Capella University, 2015.
Smeets, Max
.
"
Organisational integration of offensive cyber capabilities: A primer on the benefits and risks
." In
2017 9th International Conference on Cyber Conflict (CyCon)
. Tallinn, Estonia , 2017.
Hoskins, Brittany N.
.
The Rhetoric of Commoditized Vulnerabilities: Ethical Discourses in Cybersecurity
. Vol. Master of Arts. Blacksburg, VA: Virginia Polytechnic Institute and State University, 2015.
Labrie, Mathieu
.
La Sécurisation du Cyberterrorisme aux États-Unis
. Vol. Maîtrise en science politique. Université du Québec à Montréal, 2011.
Simons, Hans Jozef Adri
.
Consensual Hallucinations the Politics of Identity in Dutch Cyber Security Policy
. Vol. Master of Science in Political Science. Radboud University Nijmegen, 2014.
Kovačević, Božo
.
"
Američko javno-privatno partnerstvo i cyber sigurnost
."
Politička misao
51, no. 3 (2014): 76-100.
Lauren, M. K.
,
J. M. Smith
,
J. Moffat
, and
N. D. Perry
.
Using the Fractal Attrition Equation to Construct a Metamodel of the Mana Cellular Automaton Combat Model
In
The Technical Cooperation Program, Joint Systems and Analysis Group
., 2005.
McIntosh, G. C.
, and
M. K. Lauren
.
"
Incorporating Fractal Concepts into Equations of Attrition for Military Conflicts
."
The Journal of the Operational Research Society
59, no. 5 (2008): 703-713 .
McIntosh, G.C.
, and
M.K. Lauren
.
"
Incorporating Fractal Concepts into Equations of Attrition for Military Conflicts
." In
OR, Defence and Security. The OR Essentials series
, 101-123. London: Palgrave Macmillan, 2015.
Vasileiadis, Alexios
.
"
Security Concerns and Trust in the Adoption of M-Commerce
."
Social Technologies
4, no. 1 (2014): 179-191.
Marufu, Anesu M. C.
, and
Khulumani Sibanda
.
"
An M-Commerce Security Framework for ICT4D Contexts
." In
Southern Africa Telecommunication Networks and Applications Conference (SATNAC) 2013
. Spier Wine Estate, Stellenbosch, Western Cape, South Africa, 2013.
Alqatan, S
,
D Singh
, and
Kamsuriah Ahmad
.
"
Study on success factors to enhance customer trust for mobile commerce in small and medium-sized tourism enterprises (SMTEs) - A conceptual model
."
Journal of Theoretical and Applied Information Technology
46, no. 2 (2012): 550-564.
Lina, Iuon-Chang
,
Hsia-Hung Oub
, and
Min-Shiang Hwang
.
"
Efficient access control and key management schemes for mobile agents
."
Computer Standards & Interfaces
26, no. 5 (2004): 423-433.
Nikooghadam, Morteza
, and
Ali Zakerolhosseini
.
"
Secure Communication of Medical Information Using Mobile Agents
."
Journal of Medical Systems
36, no. 6 (2012): 3839-3850.
Nikooghadam, Morteza
,
Farshad Safaei
, and
Ali Zakerolhosseini
.
"
An efficient key management scheme for mobile agents in distributed networks
." In
2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010)
. Solan, India , 2010.
Pan, Jen-Yi
,
Tzer-Long Chen
, and
Tzer-Shyong Chen
.
A Novel Key Management and Access Control Scheme for Mobile Agent
In
Computational Intelligence. ICIC 2006. Lecture Notes in Computer Science
. Vol. 4114. Berlin, Heidelberg: Springer, 2006.
Lei, Ming
,
Quanjun Yin
, and
Xinyu Yao
.
"
A method of encircle tactic based on geometric analysis in pursuit-evasion games
." In
2016 IEEE International Conference on Mechatronics and Automation
. Harbin, China , 2016.
G., Lenzini
,
Sahli N.
, and
Eertink H.
.
Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities
In
Trust in Agent Societies. TRUST 2008. Lecture Notes in Computer Science
. Vol. 5396. Berlin, Heidelberg: Springer, 2008.
Sahli, Nabil
,
Gabriele Lenzini
, and
Henk Eertink
.
Trustworthy Agent-Based Recommender System in a Mobile P2P Environment
In
Agents and Peer-to-Peer Computing. AP2PC 2009, AP2PC 2008. Lecture Notes in Computer Science
. Vol. 6573. Berlin, Heidelberg: Springer, 2009.
Pages
« първа
‹ предишна
…
332
333
334
335
336
337
338
339
340
…
следваща ›
последна »
340566 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance