Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Jallood, Jwan
.
Development of E-Government Application to Manage Patients’ Information: A Case Study of Health Sector In Mosul – Iraq
In
Graduate School Of Natural And Applied Sciences, Computer Engineering
. Çankaya University, 2013.
Aiyadurai, Yoganand
.
Hippocratic data sharing in e-government space with contract management
In
Information Technology in the Department of Information Technology Faculty of Accounting and Informatics
. Vol. Magister Technologiae. Durban University of Technology, 2015.
Asare-Nuamah, Peter
, and
Agyepong Emmanuel Darko
.
"
University Students’ Perceptions on the Adoption of Electronic Voting
."
Global Journal of Interdisciplinary Social Sciences
5, no. 6 (2016): 7-13.
Ugwueze, Michael I.
,
Jonah Onuoha
, and
Ejikeme J. Nwagwu
.
"
Electronic Governance and National Security in Nigeria
."
Mediterranean Journal of Social Sciences
7, no. 6 (2016).
Lutui, Paula Raymond
,
Brian Cusack
, and
George Maeakafa
.
"
ICT vision & strategy for a developing country harmonization of environment & engineering
." In
IEEE International Conference on Environmental Engineering (EE)
. Milan, Italy : IEEE , 2018.
Shafique, Muhammad Aatif
,
Babar Hayat Malik
,
Yasar Mahmood
,
Sadaf Nawaz Cheema
,
Khizar Hameed
, and
Shabana Tabassum
.
"
Determinants Impacting the Adoption of E-Government Information Systems and Suggesting Cloud Computing Migration Framework
."
International Journal of Advanced Computer Science and Applications (ijacsa)
8, no. 9 (2017).
M.H., Mohammed Hitham
,
Hatem Elkadi H.K.
, and
Sherine Ghoneim S.G.
.
"
A 7-Layered E-Government Framework Consolidating Technical, Social and Managerial Aspects
."
International Journal of Advanced Computer Science and Applications (IJACSA)
8, no. 8 (2017).
Saeed, Hassan
.
Development of E-Government Application in Iraq: A Case Study of Iraq Ministry of Education Employment Agency
In
Graduate School Of Natural and Applied Science, Computer Engineering
. Vol. Master Thesis. Çankaya University, 2013.
Abraham, Jobin
, and
Varghese Paul
.
"
Watermark Captioning for Images in E-Governance
."
International Journal of Computer Applications in Engineering Sciences
II, no. II (2012).
Al-Muhtadi, Jalal
,
Basit Shahzad
,
Kashif Saleem
,
Wasif Jameel
, and
Mehmet A. Orgun
.
"
Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment
."
Health Informatics Journal
10, no. 22 (2017).
K. Naik, Seena
,
G. A. Ramachandra
, and
M. V. Bramhan Reddy
.
"
An Extended Security Framework for E-Government
."
International Journal of Advanced Research in Computer Science
5, no. 1 (2014): 152-154.
Meshu, Tesfayee
, and
Sanjiv G Rao
.
"
Framework for Securing Educational E-Government Service
."
International Journal on Cybernetics & Informatics (IJCI)
5, no. 4 (2016).
Røberg, Pernille Monstad
.
Unveiling barriers and enablers of risk management in interoperability efforts: A study from the Norwegian public sector
In
Faculty of Economic and Social Sciences, Department of Information Systems
. Vol. Master’s Thesis. University of Agder, 2013.
Hashim, Hasan Adnan
.
A Study of Adoption and Acceptance of e-Umrah System in Saudi Arabia: Overcoming Infrastructure Barriers and Limitations
In
Information School
. Vol. Doctor of Philosophy. University of Sheffield, 2014.
Asare-Nuamah, Peter
, and
‘Darko Emmanuel Agyepong
.
"
Techno Legal Support for E-Governance and Implementation Challenges in Ghana
."
SOCRATES: An International, Multi-lingual, Multi-disciplinary, Refereed (peer-reviewed), Indexed Scholarly journal
4, no. Extra 3 (2016): 47-57.
Izzati, Berlian Maulidya
.
Analisis Pengaruh Kualitas Layanan Publik E-Government (Government to Citizen) Terhadap Penciptaan Public Value (Studi Kasus: Kota Surabaya)
In
Institut Teknologi Sepuluh Nopember
. Vol. Masters thesis., 2017.
Guo, Jing-Ming
, and
Ming-Feng Wu
.
"
Improved Block Truncation Coding Based on the Void-and-Cluster Dithering Approach
."
IEEE Transactions on Image Processing
8, no. 1 (2009).
Guo, Jing-Ming
, and
Yun-Fu Liu
.
"
Joint Compression/Watermarking Scheme Using Majority-Parity Guidance and Halftoning-Based Block Truncation Coding
."
IEEE Transactions on Image Processing
19, no. 8 (2010).
Guo, Jing-Ming
,
Min-Feng Wu
, and
Yong-Chuen Kang
.
"
Watermarking in conjugate ordered dither block truncation coding images
." In
IEEE International Symposium on Circuits and Systems
. Taipei, Taiwan , 2009.
Hu, Yu-Chen
,
Chun-Chi Lo
,
Wu-Lin Chen
, and
Chia-Hsien Wen
.
"
Joint image coding and image authentication based on absolute moment block truncation coding
."
Journal of Electronic Imaging
22, no. 1 (2013).
A.Saleh, Noura
,
Hoda N.Boghdady
,
Samir I.Shaheen
, and
Ahmed M.Darwish
.
"
High capacity lossless data embedding technique for palette images based on histogram analysis
."
Digital Signal Processing
20, no. 6 (2010): 1629-1636.
Hsu, Ching-Sheng
, and
Shu-Fen Tu
.
Digital Watermarking Scheme with Visual Cryptography
In
International MultiConference of Engineers and Computer Scientists, IMECS 2008
. Vol. I. Hong Kong, 2008.
Kim, Cheonshik
,
Dongkyoo Shin
, and
Dongil Shin
.
Data Hiding in a Halftone Image Using Hamming Code (15, 11)
In
Intelligent Information and Database Systems. ACIIDS 2011. Lecture Notes in Computer Science
. Vol. 6592. Berlin, Heidelberg: Springer, 2011.
Guo, Jing-Ming
, and
Jia-Jin Tsai
.
"
Reversible data hiding in low complexity and high quality compression scheme
."
Digital Signal Processing
22, no. 5 (2012): 776-785.
Kim, Cheonshik
.
Data Hiding Based on Compressed Dithering Images
In
Advances in Intelligent Information and Database Systems. Studies in Computational Intelligence
. Vol. 283. Berlin, Heidelberg: Springer, 2010.
Pages
« първа
‹ предишна
…
341
342
343
344
345
346
347
348
349
…
следваща ›
последна »
372496 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance