Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Starov, Oleksii
, and
Sergiy Vilkomir
.
"
Cloud services and tools for mobile testing
."
Радіоелектронні і комп’ютерні системи
5 (2013): 362-371.
Bertolino, Antonia
, and
Lata Nautiyal
.
"
Annotated buzzwords and key references for software testing in the cloud
." In
International Conference on Computing, Communication and Automation (ICCCA)
. Greater Noida, India, 2017.
Bertolino, Antonia
,
Antonello Calabrò
,
Eda Marchetti
,
Anton Cervantes Sala
,
Guiomar Tuñón de Hita
,
Ilie Daniel Ghe Pop
, and
Varun Gowtham
.
"
Perceived Needs and Gains from an Industrial Study in Cloud Testing Automation
." In
IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion)
. Zurich, Switzerland , 2018.
Sotiriadis, Stelios
,
Andrus Lehmets
,
Euripides G. M. Petrakis
, and
Nik Bessis
.
Unit and Integration Testing of Modular Cloud Services
In
IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)
. Taipei, Taiwan , 2017.
Sotiriadis, Stelios
,
Andrus Lehmets
,
Euripides G. M. Petrakis
, and
Nik Bessis
.
Testing Cloud Services Using the TestCast Tool
In
Information Technology - New Generations, 14th International Conference on Information Technology
., 2017.
Rodrigues, Renato
.
Defining a test automation system for mobile apps
In
Faculdade de Engenharia
. Vol. Mestrado Integrado em Engenharia Informática e Computação. Universidade do Porto, 2014.
Nunes, Sérgio Rodrigues
.
Value focused assessment of cyber risks to gain benefits from security investments
In
Instituto Superior de Economia e Gestão
. Vol. Doutor em Gestão. Universidade de Lisboa, 2018.
Apple, Benjamin G.
.
How the adoption of the big-data paradigm affects the key factors that influence the effectiveness of an information assurance (IA) framework: A multiple-case study
. Capella University, 2017.
Нигматуллин, Ришат Вахид
, and
Римма Рифха Сулейманова
.
"
Стратегия ООН в борьбе с транснациональной организованной преступностью
."
Всероссийский криминологический журнал
(2016).
Carr, Chadd
.
Exploration into the Types, Operational Areas, and Peripheral Resources of Cyber Threat Intelligence: An Expert Panel Delphi Study
. Northcentral University, 2017.
Готчина, Лариса Влади
.
"
Криминологическая характеристика российской наркопреступности: структура, динамика и прогноз
."
Всероссийский криминологический журнал
(2017).
Bichler, Gisela
,
Aili Malm
, and
Tristen Cooper
.
"
Drug supply networks: a systematic review of the organizational structure of illicit drug trade
."
Crime ScienceAn Interdisciplinary Journal
6, no. 2 (2017).
Zheng, Quan
, and
David B. Skillicorn
.
"
Analysis of criminal social networks with typed and directed edges
." In
IEEE International Conference on Intelligence and Security Informatics (ISI)
. Baltimore, MD, USA , 2015.
Bright, David
,
Johan Koskinen
, and
Aili Malm
.
"
Illicit Network Dynamics: The Formation and Evolution of a Drug Trafficking Network
."
Journal of Quantitative Criminology
(2018): 1-22.
Malm, Aili
,
Martin Bouchard
,
,
Marieke Vlaemynck
, and
Marije Wouters
.
"
More structural holes, more risk? Network structure and risk perception among marijuana growers
."
Social Networks Volume
51 (2017): 127-134.
Bahulkar, Ashwin
,
Boleslaw K. Szymanski
,
Orkun N. Baycik
, and
Thomas C. Sharkey
.
"
Community detection with edge augmentation in criminal networks
." In
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
. Barcelona, Spain , 2018.
Zheng, Quan
, and
David Skillicorn
.
Social Networks with Rich Edge Semantics (Open Access)
. Boca Raton: CRC Press, 2017.
Bahulkar, Ashwin
,
Orkun N. Baycik
,
Thomas Sharkey
,
Yeming Shen
,
Boleslaw Szymanski
, and
William Wallace
.
"
Integrative Analytics for Detecting and Disrupting Transnational Interdependent Criminal Smuggling, Money, and Money-Laundering Networks
." In
IEEE International Symposium on Technologies for Homeland Security (HST)
. Woburn, MA, USA , 2018.
Zheng, Quan
.
Spectral Techniques for Heterogeneous Social Networks
In
School of Computing
. Vol. Doctor of Philosophy . Ontario, Canada: Queen’s University Kingston, 2016.
Backman, Sarah
.
The institutionalization of cybersecurity management at the EU-Level: 2013-2016
In
Swedish National Defence College
. Vol. Master. Swedish Defence University, 2016.
Cullen, Daniel Thomas
.
Building a Computer Security Incident Response Team: Required Skills and Characteristic
. Vol. Dissertation. Northcentral University, 2018.
Quisumbing, Lowell A.
.
"
Global Perspectives on Cyber security Using Latent Dirichlet Allocation Algorithm
."
International Journal of Applied Engineering Research
12, no. 20 (2017): 10310-10323.
De Prijck, Anke
.
The terminology of cybercrime. A contribution to the IATE-CvT project (English-Dutch-Spanish)
In
Faculteit Letteren & Wijsbegeerte
. Vol. Master in het Vertalen. Universiteit Gent, 2016.
Tumkevič, A.
.
"
Uncertain Security Community: Building Western Cyber-Security Order
."
Journal of Information Warfare; Yorktown
17, no. 1 (2018): 74-86.
Demchak, Chris
,
Jason Kerben
,
Jennifer McArdle
, and
Francesca Spidalieri
.
United States of America: Cyber Readiness at a Glance
. Potomac Institute for Policy Studies, 2016.
Pages
« първа
‹ предишна
…
362
363
364
365
366
367
368
369
370
…
следваща ›
последна »
340541 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance