Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Brázová, Věra – Karin
.
"
Response of Central European Civil Security Systems to the Economic Crisis
."
Central European Journal of Public Policy
9, no. 2 (2015).
Bernard, Gregory M.
.
Who is Professor Plum? A framework for defining non-state adversaries
. Vol. Doctor of Science. New Jersey City University, 2016.
Kortjan, Noluxolo
, and
Rossouw von Solms
.
Cyber Security Education in Developing Countries: A South African Perspective
In
e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
. Vol. 119. Berlin, Heidelberg: Springer, 2012.
Mavee, S.M.A.
, and
E.M. Ehlers
.
A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power Grid
In
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
. Liverpool, UK: IEEE, 2012.
Setiawan, Ahmad Budi
,
Aries Syamsudin
, and
Ashwin Sasongko
.
"
Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid Electricity
." In
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec)
. Jakarta, Indonesia : IEEE, 2015.
Christensen, Sharon
,
William J. Caelli
,
William D. Duncan
, and
Eugenia Georgiades
.
"
An Achilles heel: denial of service attacks on Australian critical information infrastructures
."
Information & Communications Technology Law
19, no. 1 (2010).
Hua, Jian
, and
Sanjay Bapna
.
Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking
In
CIS 2011 Proceedings
. Vol. 4., 2011.
Musarurwa, Alfred
, and
Husin Jazri
.
"
A proposed framework to measure growth of Critical Information Infrastructure Protection in Africa
." In
2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)
. Windhoek, Namibia: IEEE, 2015.
Mohideen, Feroze
.
The Cyber-Security State of our Nation: A Critique of South Africas Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure
In
ICCWS 2016 11th International Conference on Cyber Warfare and Security
., 2016.
Hamida, Yaou
,
Baina Amine
, and
Bellafkih Mostafa
.
"
Toward resilience management in critical information infrastructure
." In
2015 5th World Congress on Information and Communication Technologies (WICT)
. Marrakech, Morocco : IEEE, 2015.
Ahmad, Arniyati
.
A cyber exercise post assessment framework: In Malaysia perspectives
In
School of Computing Science, College of Science and Engineering
. Vol. Doctor of Philosophy. University of Glasgow, 2016.
von Solms, R
, and
B von Solms
.
"
National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
." In
Iccws 2015 - The Proceedings of the 10th International Conference on Cyber Warfare and Security
. South Africa, 2015.
Amideo, Annunziata Esposito
, and
Maria Paola Scaparra
.
A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability
In
Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science
. Vol. 10242. Paris, France , 2017.
Gelbstein, Eduardo E.
.
"
Designing a Security Audit Plan for a Critical Information Infrastructure (CII)
." In
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
, 262-285., 2013.
Setiawan, Ahmad Budi
.
"
Peningkatan Keamanan Supervisory Control and Data Acquisition (Scada) Pada Smart Grid Sebagai Infrastruktur Kritis
."
Jurnal Penelitian Pos dan informatika
6, no. 1 (2016).
Martins, José
,
Henriques dos Santos
, and
Paulo Nunes
.
"
Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação
."
Proelium (Revista Científica da Academia Militar)
VII (2012): 31-66.
Musarurwa, Alfred
, and
Husin Jazri
.
"
A Proposed Framework to Measure Growth of Critical Information Infrastructure Protection in Africa
." In
Conference: International Conference on Emerging Trends in Network and Computer Communication
. Namibia, 2014.
Martin, Ioana
.
Critical Information Infrastructure Protection: Towards Global Cyber Security
In
Regional Department of Defense Resources Management Studies
. Romanian National Defense University, 2014.
Herrera, Luis-Carlos
, and
Olaf Maennel
.
"
A comprehensive instrument for identifying critical information infrastructure services
."
International Journal of Critical Infrastructure Protection
25 (2019): 50-61.
Deliverable D7.1: Review of the State-of-the-Art in Cyberattacks
In
Seventh Framework Programme Information & Communication Technologies Trustworthy ICT, Network of Excellence
., 2011.
Velasquez, Luis Carlos Her
.
A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
In
Institute of Computer Science, Cyber Security Curriculum
. Vol. Master’s Thesis. University of Tartu, 2016.
Njotini, MN
.
"
Protecting Critical Databases: Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa
."
Potchefstroom Electronic Law Journal
16, no. 1 (2013).
Unger, Brigitte
, and
Johan den Hertog
.
"
Water always finds its way: Identifying new forms of money laundering
."
Crime, Law and Social Change
57, no. 3 (2012): 287-304.
Odi, Nwankwo
, and
Onyekachi Richard Eze
.
"
Electronic Payment in Cashless Economy of Nigeria: Problems and Prospect
."
Journal of Management Research
5, no. 1 (2013).
Tsakalidis, George
, and
Kostas Vergidis
.
"
A Systematic Approach Toward Description and Classification of Cybercrime Incidents
."
IEEE Transactions on Systems, Man, and Cybernetics: Systems
(2017): 1-20.
Pages
« първа
‹ предишна
…
346
347
348
349
350
351
352
353
354
…
следваща ›
последна »
372528 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance