Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Joshi, Vanita
, and
Alok Bansal
.
"
Applicability of Artificial Neural Networks in Business
." In
Information Technology Issues & Challenges
. India: Excel Books, 2009.
F.Ryman-Tubb, Nick
,
Paul Krause
, and
Wolfgang Garn
.
"
How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark
."
Engineering Applications of Artificial Intelligence
76 (2018): 130-157.
Manjula, D.
, and
J. Thilagavathi
.
"
A Novel Approach for Behavior based Charge Card Fraud Detection using Support Vector Machines
."
IJSRD - International Journal for Scientific Research & Development|
3, no. 6 (2015).
Bach, Mirjana Pejić
,
Nikola Vlahović
, and
Jasmina Pivar
.
"
Self-organizing maps for fraud profiling in leasing
." In
41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
. Opatija, Croatia , 2018.
Grzywa, Michal
, and
Alior Bank S.A.
.
Zastosowanie Sztucznych Sieci Neuronowych w Detekcji Kartowych Transakcji Oszukańczych
., 2011.
Ciccone, Anne
,
Garcia Bodley
,
Tonya Hansel
,
Maureen McDonough
,
Lauren McShan
,
Howard Osofsky
,
Joy Osofsky
,
Erin Reuther
,
Lisa Schuster
,
Anthony Speier
et al.
Disaster Psychosocial Assessment and Surveillance Toolkit (Disaster-PAST): Methods to Enhance Disaster Preparedness, Response and Recovery
. Louisiana State University Health Sciences Center Department of Psychiatry, 2014.
Mohammadzadeh, Mohsen
.
The Neoliberalised City Fantasy: The place of desire and discontent
. Vol. Doctor of Philosophy. University of Auckland, 2014.
Lupu, Catalin
,
Valeriu Lupu
, and
Gîlc Gheorghe
.
Securing online banking services using iris recognition
In
Annals of the "Constantin Brancusi" University of Targu Jiu, Engineering Series
., 2015.
Abikoye, O.C.
,
J.O. Omolehin
, and
J.S. Sadiku
.
"
Some Refinement on Iris Localization Algorithm
."
International Journal of Engineering and Technology
2, no. 11 (2012).
Forster, Benjamin
.
NATO's Role in the Global War on Terror: Is the Alliance Obsolete?
In
Claremont-UC Undergraduate Research Conference on the European Union
. Vol. 2009., 2012.
Wei, Li
, and
Xue Li
.
"
Maritime Silk Road in the 21st Century: Security Risks and Countermeasures (21 世纪海上丝绸之路: 安全风险及其应对)
."
Taiping Ocean News
(2015).
Stuppia, Giuseppe
.
Pirateria e diritto internazionale: dalle vicende somale al caso Enrica Lexie
. Vol. Dottorato di ricerca in Diritto internazionale e dell’Unione europea – XXIV Ciclo. Sapienza, Universita di Roma, 2013.
Frühling, Stephan
.
"
“Key to the defense of the free world”: The past, present and future relevance of NATO for US allies in the Asia–Pacific
."
Journal of Transatlantic Studies
(2019): 1-17.
Beskow, David M.
, and
Kathleen M. Carley
.
"
Social Cybersecurity An Emerging National Security Requirement
."
Military Review
(2019).
.
"
Revealing the propaganda of communication between the islamic fundamentalism activists of the middle east and Indonesia
."
Jurnal Komunikasi: Malaysian Journal of Communication
34, no. 2 (2018): 137-151.
Holbrook, D.
.
"
A critical analysis of the role of the internet in the preparation and planning of acts of terrorism
."
Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide
4, no. 2 (2015): 121-133.
Hai-Jew, S.
.
"
Human rights, the global war on transnational terror, and the mixed roles of ICT: A meta-analysis
." In
Cyber Behavior: Concepts, Methodologies, Tools, and Applications
, 1260-1294 ., 2014.
Carlile, L.
, and
S. MacDonald
.
"
The criminalisation of terrorists' online preparatory acts
." In
Cyberterrorism: Understanding, Assessment, and Response
, 155-173., 2014.
Lawson, S.
.
"
The US military's social media civil war: technology as antagonism in discourses of information-age conflict
."
Cambridge Review of International Affairs
27, no. 2 (2014): 226-245.
Acharya, A.
.
Ten years after 9/11: Rethinking the jihadist threat
., 2013.
Ogun, M.N.
.
"
Terrorist Use of Internet: Possible Suggestions to Prevent the Usage for Terrorist Purposes
."
Journal of Applied Security Research
7, no. 2 (2012): 203-217.
Veerasamy, N.
, and
M. Grobler
.
"
Terrorist use of the internet: Exploitation and support through ICT infrastructure
." In
6th International Conference on Information Warfare and Security, ICIW 2011
. Washington, DC; United States, 2011.
Maled, V.
.
"
Computer forensics: A tool to prevent cybercrime
."
Journal of South India Medicolegal Association
2, no. 2 (2010): 60-63.
Conway, Maura
.
"
Terrorism and the Internet: New media - New threat?
"
Parliamentary Affairs
59, no. 2 (2006): 283-298.
Vatsa, Mayank
,
Richa Singh
,
Afzel Noore
, and
Arun Ross
.
"
On the Dynamic Selection of Biometric Fusion Algorithms
."
IEEE Transactions on Information Forensics and Security
5, no. 3 (2010).
Pages
« първа
‹ предишна
…
352
353
354
355
356
357
358
359
360
…
следваща ›
последна »
372617 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance