Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Breu, R.
,
R. Grosu
,
F. Huber
,
B. Rumpe
, and
W. Schwerin
.
"
Systems, Views and Models of UML
." In
The Unified Modeling Language, Technical Aspects and Applications
, 3-8. Heidelberg: Physica Verlag, 1998.
Gaydarski, I.
, and
Zlatogor Minchev
.
Virtual Enterprise Data Protection: Framework Implementation with Practical Validation
In
BISEC 2018
. Belgrade, Serbia, 2018.
Forrester, J.
.
World Dynamics
. Cambridge, Massachusetts: Wright-Allen Press, 1971.
Meadows, D.
,
J. Randers
, and
D. Meadows
.
Limits to Growth: The 30-Year Update
. Chelsea Green Publishing Company, 2004.
CYREX 2018 Web Page
., 2019.
Gaydarski, I.
,
P. Kutinchev
, and
Zlatogor Minchev
.
Modelling & Deployment of Data Protection Component of Information Security Systems
In
First International Interdisciplinary Conference on Information and Cyber Security-Global, ICICSG’2017
. Istanbul, 2017.
Li, Xingan
, and
Martti Juhola
.
"
Country crime analysis using the self-organising map, with special regard to economic factors
."
International Journal of Data Mining, Modelling and Management
7, no. 2 (2015).
Li, Xingan
, and
Martti Juhola
.
"
Crime and Its Social Context: Analysis Using the Self-Organizing Map
." In
European Intelligence and Security Informatics Conference
. Uppsala, Sweden , 2013.
Li, Xingan
,
Henry Joutsijoki
,
Jorma Laurikkala
,
Markku Siermala
, and
Martti Juhola
.
"
Homicide and Its Social Context: Analysis Using the Self-Organizing Map
."
Applied Artificial Intelligence An International Journal
29, no. 4 (2015).
Lebichot, Bertrand
,
Fabian Braun
,
Olivier Caelen
, and
Marco Saerens
.
A graph-based, semi-supervised, credit card fraud detection system
In
Complex Networks & Their Applications V. COMPLEX NETWORKS 2016. Studies in Computational Intelligence
. Vol. 693. Cham: Springer, 2016.
Sorournejad, Samaneh
,
Zahra Zojaji
,
Reza Ebrahimi Atani
, and
Amir Hassan Monadjemi
.
A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective
In
Computer Science, Cryptography and Security
. Cornell University , 2016.
Li, Xingan
,
Henry Joutsijoki
,
Jorma Laurikkala
, and
Martti Juhola
.
"
Crime vs. Demographic Factors Revisited: Application of Data Mining Methods
."
Webology
12, no. 1 (2015).
Almendra, Vinicius da Silva
, and
Denis Enachescu
.
"
Using Self-Organizing Maps for Fraud Prediction at Online Auction Sites
." In
15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
. Timisoara, Romania , 2013.
Jeong, Seong Hoon
,
Hana Kim
,
Youngsang Shin
,
Taejin Lee
, and
Huy Kang Kim
.
"
A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)
."
Journal of the Korea Institute of Information Security and Cryptology (정보보호학회논문지)
25, no. 6 (2015): 1525-1540.
Mahmud, Mohammad Sultan
,
Phayung Meesad
, and
Sunantha Sodsee
.
"
An evaluation of computational intelligence in credit card fraud detection
." In
International Computer Science and Engineering Conference (ICSEC)
. Chiang Mai, Thailand , 2016.
Li, Xingan
,
Henry Joutsijoki
,
Jorma Laurikkala
, and
Martti Juhola
.
"
GDP growth vs. criminal phenomena: data mining of Japan 1926–2013
."
AI & SOCIETY
33, no. 2 (2018): 261-274.
Falaki, S. O.
,
B. K. Alese
,
O. S. Adewale
,
J. O. Ayeni
,
G. A. Aderounmu
, and
W. O. Ismaila
.
"
Probabilistic Credit Card Fraud Detection System in Online Transactions
."
International Journal of Software Engineering and Its Applications
6, no. 4 (2012).
Almendra, Vinicius
, and
Denis Enachescu
.
"
Using Self-Organizing Maps for Binary Classification With Highly Imbalanced Datasets
."
International Journal of Numerical Analysis and Modeling, Series B
5, no. 3 (2014): 238-254.
Zanin, Massimiliano
,
Miguel Romance
,
Santiago Moral
, and
Regino Criado
.
"
Credit Card Fraud Detection through Parenclitic Network Analysis
."
Complexity
(2018).
Sitek, Albert
, and
Zbigniew Kotulski
.
"
POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions
."
EURASIP Journal on Information Security
(2018).
Zheng, Lutao
,
Guanjun Liu
,
Chungang Yan
, and
Changjun Jiang
.
"
Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity
."
IEEE Transactions on Computational Social Systems
5, no. 3 (2018).
Taghva, Mohammad Reza
,
Taha Mansouri
,
Kamran Feiz
, and
Babak Akhgar4
.
"
Fraud Detection in Credit Card Transactions; Using Parallel Processing of Anomalies in Big Data
."
Journal of Information Technology Management
8, no. 3 (2016): 477-498.
Barman, Subhas
,
Utpal Pal
,
Asif Sarfaraj
,
Biswajit Biswas
,
Animesh Mahata
, and
Palash Mandal
.
"
A complete literature review on financial fraud detection applying data mining techniques
."
International Journal of Trust Management in Computing and Communications (IJTMCC)
3, no. 4 (2016).
Falaki, S. O.
,
B. K. Alese
, and
W. O. Ismaila
.
"
An update research on credit card on-line transactions
."
International Journal of Economic Development Research and Investment
1, no. 2 & 3 (2010).
Malekpour, Milad
,
Maryam Khademi
, and
Behrouz Minae-Bidgoli
.
"
A Hybrid Data Mining Method for Intrusion and Fraud Detection in E-Banking Systems
."
Journal of Computational Intelligence and Electronic Systems
3, no. 1–6 (2014).
Pages
« първа
‹ предишна
…
350
351
352
353
354
355
356
357
358
…
следваща ›
последна »
372580 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance