Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Ibrishimova, Marina Danchovsky
, and
Kin Fun Li
.
A Machine Learning Approach to Fake News Detection Using Knowledge Verification and Natural Language Processing
In
Advances in Intelligent Networking and Collaborative Systems. INCoS 2019. Advances in Intelligent Systems and Computing
. Vol. 103., 2019.
Sitter, Nick
, and
Elisabeth Bakke
.
Democratic Backsliding in the European Union
In
Oxford Research Encyclopedia of Politics
., 2019.
Beskow, David M.
, and
Kathleen M. Carley
.
"
La ciberseguridad social: Un ámbito emergente de la seguridad nacional/Social Cybersecurity: An Emerging National Security Requirement
."
Military Review
(2019).
Oosterholt, Roderik
.
Gas and Reunification in Cyprus: Exploring the Linkages Between the Politics of Natural Gas and the Peace Talks in Cyprus
In
Conflict Studies & Human Rights
. Vol. Master of Arts. Utrecht University, 2019.
Pitman, Lora
.
The Trojan Horse in Your Head: Cognitive Threats and How to Counter Them
In
International Studies
. Vol. Doctor of Philosophy (PhD). Old Dominion University, 2019.
Molstad, Kristine Sommerstad
.
The Shadow in the Mirror : The Politics and Psychology of the Internalised Double in Chuck Palahniuk’s Fight Club and Jess Walter’s The Zero
. Vol. Master's thesis. University of Agder, 2019.
Stejskalová, Jana
.
Geneze ruské propagandy jako vážné bezpečnostní hrozby 21. století z pohledu NATO a EU
In
Fakulta Sociálních Věd, Institut politologických studií, Katedra bezpečnostních studií
. Vol. Diplomová práce. Praha: Univerzita Karlova, 2019.
Bergh, Arild
.
Social Network Centric Warfare – Understanding Influence Operations in Social Media
In
FFI-Rapport
. Norwegian Defence Research Establishment (FFI) , 2019.
Larsen, Marie Hjelseth
, and
Susann Øvretveit
.
Corruption in the Arms- and Defense Industry: A comparative study of the largest American and European arms dealers
. Bergen: Norwegian School of Economics, 2019.
Guía Metodológica para la Proyección de Financiación de Capacidades
. Vol. v.1.0 . Bogotá, Colombia: Ministerio de Defensa Nacional, 2018.
Dulschi, Olivia
.
Utilisation of Security Systems in Public Administration
In
Conferinței Științifice Internaționale "Contribuția tinerilor cercetători la dezvoltarea administrației publice"
. Chișinău: Academia de Administare Publică, 2019.
Ratner, Michael
, and
Carol Glover
.
U.S. Energy: Overview and Key Statistics
In
Congressional Research Service
., 2014.
Knapp, Eric D.
, and
Raj Samani
.
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
. Waltham, MA: Syngress, 2013.
Liu, Jing
,
Yang Xiao
,
Shuhui Li
,
Wei Liang
, and
CL Philip Chen
.
"
Cyber Security and Privacy Issues in Smart Grids
."
IEEE Communications Surveys & Tutorials
14, no. 4 (2012): 981-997.
Rootzén, Johan
.
Reducing Carbon Dioxide Emissions from the EU Power and Industry Sectors – An Assessment of Key Technologies and Measures
. Research.chalmers.se, 2012.
Greer, Christopher
,
David A. Wollman
,
Dean E. Prochaska
,
Paul A. Boynton
,
Jeffrey A. Mazer
,
Cuong T. Nguyen
,
Gerald J. FitzPatrick
,
Thomas L. Nelson
,
Galen H. Koepke
, and
Allen R. Hefner, Jr.
.
NIST Framework and Roadmap for Smart Grid Interoperability Standards, release 3.0
In
NIST Special Publication
., 2014.
Halim, Fatemeh
,
Salman Yussof
, and
Mohd Ezanee Rusli
.
"
Cyber Security Issues in Smart Meter and Their Solutions
."
International Journal of Computer Science and Network Security
18, no. 3 (2018): 99-109.
Len, Ramn A.
,
Vijay Vittal
, and
G. Manimaran
.
"
Application of Sensor Network for Secure Electric Energy Infrastructure
."
IEEE Transactions on Power Delivery
22, no. 2 (2007): 1021-1028.
Mohagheghi, Salman
,
J. Stoupis
, and
Z. Wang
.
"
Communication Protocols and Networks for Power Systems – Current Status and Future Trends
." In
2009 IEEE/PES Power Systems Conference and Exposition
. Seattle, WA , 2009.
Ghassemi, A.
,
S. Bavarian
, and
Lutz Lampe
.
"
Cognitive Radio for Smart Grid Communications
." In
2010 First IEEE International Conference on Smart Grid Communications
. Gaithersburg, MD, 2010.
SGC Committee
.
Smart Grid Cybersecurity Strategy Architecture and High-Level Requirements
In
The Smart Grid Interoperability Panel, Technical Report
., 2014.
Liu, Jing
,
Yang Xiao
, and
Jingcheng Gao
.
"
Achieving Accountability in Smart Grid
."
IEEE Systems Journal
8, no. 2 (2014): 493-508.
Yang, Tim Littler Y.
,
Sakir Sezer
,
Kieran McLaughlin
, and
H.F. Wang
.
"
Impact of Cyber-Security Issues on Smart Grid
." In
2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies
. Manchester, 2011.
Lu, Xiang Lu
,
Wenye Wang
, and
Cliff Wang
.
"
Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid
." In
2010 – MILCOM 2010 Military Communications Conference
. San Jose, CA, 2010.
Jin, Dong
,
David M. Nicol
, and
Guanhua Yan
.
An Event Buffer Flooding Attack in DNP3 Controlled SCADA Systems
In
2011 Winter Simulation Conference (WSC)
. Phoenix, AZ, 2011.
Pages
« първа
‹ предишна
…
374
375
376
377
378
379
380
381
382
…
следваща ›
последна »
340529 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance