Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Kubovič, Ondrej
.
One Year Later: EternalBlue Exploit More Popular Now than During WannaCryptor Outbreak
. Welive Security - ESET, 2018.
Thomson, Iain
.
Sinister Secret Backdoor Found in Networking Gear Perfect for Government Espionage: The Chinese are – Oh no, wait, it's Cisco again
. The Register, 2019.
.S.Suryateja, P
.
"
Threats and Vulnerabilities of Cloud Computing: A Review
."
International Journal of Computer Sciences and Engineering
6, no. 3 (2018).
"
Public Service Announcement FBI Web Page
." (2019).
Cisco Blog
., 2019.
Martino, Steve
.
Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study
In
Cisco Benchmark Report
., 2019.
ISO/IEC 27000 Family - Information Security Management Systems
. International Organization for Standardization (ISO), 2019.
De Groot, Juliana
.
What is SOX Compliance? 2019 SOX Requirements & More
. Digital Guardian, 2019.
De Groot, Juliana
.
What is HIPAA Compliance? 2019 HIPAA Requirements
. Digital Guardian, 2019.
2018 Payment Security Report
. Verizon, 2018.
Tillman, Maggie
.
Facebook F8 2019 Event Recap: All the Announcements that Matter
. Pocket-lint, 2019.
BYOD & Mobile Security: 2016 Spotlight Report
. Information Security, 2016.
Android Devices Ship with Pre-installed Malware
. Avast Threat Labs, 2018.
Cyber Attack Trends Analysis: Key Insights to Gear up for in 2019
In
Security Report
. Check Point Research, 2019.
Smartphone Factory Resets: The Benefits vs. Limitations
. Blancco e-Book, 2018.
The Promise and Pitfalls of 5G: Will It Kill Cable?
. Knowledge@Wharton, 2019.
Game of Threats. How Cybercriminals Use Popular TV Shows to Spread Malware
. Kaspersky Lab, 2019.
IoT Standards and Protocols
. Postscapes, 2019.
Muddana, Varshita
.
What is the Future of IoT or Internet of Things in next 5 years?
. SoftScript, IoT, Latest News, Marketing Trends, 2019.
A Guide to IoT: Security Basics
. CSO , 2018.
Bhunia, Swarup
, and
Mark Tehranipoor
.
Hardware Security: A Hands-on Learning Approach
. San Francisco, USA: Morgan Kaufmann, 2018.
Minchev, Zlatogor
.
Future Digital Society Resilience in the Informational Age
. Sofia: SoftTrade, 2019.
Encyclopedia Britannica
., 2015.
Global Fire Power Index
. GlobalFirepower.com, 2017.
"
The Balkan Arms Trade: Ask not from whom the AK-47s Flow
."
The Economist
(2016).
Pages
« първа
‹ предишна
…
368
369
370
371
372
373
374
375
376
…
следваща ›
последна »
372735 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance