Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Kanter, Ido
, and
Wolfgang Kinzel
.
"
The Theory of Neural Networks and Cryptography
."
Quantum Computers and Computing
5, no. 1 (2005): 130-140.
Ruttor, Andreas
,
Wolfgang Kinzel
, and
Ido Kanter
.
"
Dynamics of Neural Cryptography
."
Statistical, Nonlinear, and Soft Matter Physics, Physical review
E 75, no. 056104 (2007).
Kinzel, Wolfgang
, and
Ido Kanter
.
Neural Cryptography
In
9th International Conference on Neural Information Processing
. Vol. 3. Singapore, 2002.
Santhanalakshmi, S.
,
K. Sangeeta
, and
Gopal Krishna Patra
.
"
Design of Stream Cipher for Text Encryption Using Soft Computing based Techniques
."
IJCSNS International Journal of Computer Science and Network Security
12, no. 12 (2012): 149-152.
Ruttor, Andreas
,
Wolfgang Kinzel
,
Rivka Naeh
, and
Ido Kanter
.
"
Genetic Attack on Neural Cryptography
."
Phys. Rev
E 73.036121 (2006).
Martin, Javurek
, and
Michal Turčaník
.
"
Synchronization of Two Tree Parity Machines
." In
2016 New Trends in Signal Processing (NTSP)
. Demanovska Dolina (2016), 2016.
Martin, Javurek
, and
Michal Turčaník
.
Synchronization Verification Improvement of Two Tree Parity Machines Using Polynomial Function
In
2018 New Trends in Signal Processing (NTSP)
. Demanovska Dolina (2018), 2018.
Turčaník, Michal
.
The Optimalization of the Artificial Neural Network and Production Systems by Genetic Algorithms
In
MATLAB 2002: Proceedings of the Conference
. Prague, 2002.
Turčaník, Michal
, and
Javurek Martin
.
"
Hash Function Generation by Neural Network
." In
2016 New Trends in Signal Processing (NTSP)
. Demanovska Dolina, 2016.
Laudon, Kenneth C.
, and
Jane P. Laudon
.
Management Information Systems, Managing Digital Firm,
. 15th ed. Harlow, UK: Pearson Education, 2018.
Marshall, George H.
.
Evaluating Management Standards: Empirical Research into the Scottish Quality Management
. University of Stirling, 2006.
Jørgensen, Tine H.
,
Arne Remmen
, and
Dolores M. Mellado
.
"
Integrated Management Systems – Three Different Levels of Integration
."
Journal of Cleaner Production
14, no. 8 (2006): 713-722.
Feigenbaum, Armand
.
Total Quality Control
. McGraw-Hill Professional, 2008.
Kleppe, Anneke
,
Jos Warmer
, and
Wim Bast
.
MDA Explained: The Model Driven Architecture Practice and Promise
. Addison Wesley, 2003.
International Organization for Standardization (ISO)
., 2018.
Bulgarian Institute for Standardization
., 2018.
National Institute of Standards and Technology
.
Information Technology Standards
In
Standards Incorporated by Reference (SIBR) Database
., 2019.
Services Business Process Execution Language(WSBPEL) Technical Committee
.
Organization for the Advancement of Structured Information Standards (OASIS)
., 2019.
A Reference Model for Open Standards-Based ITSM Solutions, An IBM White Paper
In
IT Service Management Standards
., 2006.
Tagarev, Todor
, and
George Sharkov
.
Computationally intensive functions in designing and operating distributed cyber secure and resilient systems
In
20th International Conference on Computer Systems and Technologies, CompSysTech 2019
. Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.
Zhou, Z.
,
W Zhang
,
Z. Yang
, and
N. Yu
.
"
Optical exfiltration of data via keyboard LED status indicators to IP cameras
."
IEEE Internet of Things Journal
6, no. 2 (2019): 1541-1550.
Zhou, Z.
,
W. Zhang
,
Z. Yang
, and
N. Yu
.
"
Potential risk of IoT device supporting IR remote control
."
Computer Networks
148, no. 15 (2019): 307-317.
Urciuoli, Luca
, and
Juha Hintsa
.
"
Adapting supply chain management strategies to security–an analysis of existing gaps and recommendations for improvement
."
International Journal of Logistics Research and Applications
20, no. 3 (2017): 276-295.
Tagarev, Todor
, and
Dimitrina Polimirova
.
Main considerations in elaborating organizational information security policies
In
20th International Conference on Computer Systems and Technologies, CompSysTech 2019
. Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.
Jordaan, E.
.
"
South African defence policy: the rationale and impact of the SANDF’s primary role and conventional force design
."
Defence Studies
18, no. 2 (2018): 188-206.
Pages
« първа
‹ предишна
…
376
377
378
379
380
381
382
383
384
…
следваща ›
последна »
372811 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance