Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
What are the Top Ten Data Center Best Practices?
. TechXact, 2019.
Telecommunications Industry Association
.
Standards
., 2019.
Mahlianov, D.
, and
Nikolai Stoianov
.
The Security of the Internet of Things
In
Eighth International Scientific Conference “Hemus-2016"
., 2016.
Tselkov, Veselin
, and
Nikolai Stoianov
.
A Formal Model of Cryptographic Systems for Protection of Information in Computer Systems and Networks
In
Bulgarian Cryptography Days – BulCrypt 2012
. Sofia, Bulgaria, 2012.
Inc., Gartner
.
Hype Cycle for Emerging Technologies
., 2018.
Cybersecurity Information Sharing Act
In
CISA S.2588 - 113th Congress, S.754 - 114th Congress
., 2016.
Kominsky, Mitchell
.
"
The Current Landscape of Cybersecurity Policy: Legislative Issues in the 113th Congress
."
Harvard Law School National Security Journal
(2014).
Greenberg, Andy
.
CISA Security Bill: An F for Security But an A+ for Spying
. Wired, 2015.
Verizon Data Breach Investigation Report 2019
. Verizon business ready, 2019.
Microsoft Corporation
.
Five Principles for Shaping Cybersecurity Norms
., 2013.
Private Sector Engagement in Responding to the Use of the Internet and ICT for Terrorist Purposes: Strengthening Dialogue and Building Trust
. Security Council, Counter-Terrorism Committee, 2018.
EU Agency for Network and Information Security
.
European Public Private Partnership for Resilience
., 2014.
Philips, Mark
,
Jennifer Cole
, and
Jennifer Towers
.
Cyber Norms of Behaviour: Executive Summary
. Royal United Services Institute, 2018.
Capacity Building in Cyberspace: Taking Stock
In
Event Report, EU, Institute for Secu¬rity Studies, A seminar organized in the framework of the EUISS Cyber Task Force
. Brussels, 2013.
International Telecommunication Union
.
Global Partnerships with Industry Players
., 2018.
OAS and Symantec to Present Cyber Security Report on June 2nd
. Organization of American States, Press Department, 2014.
The Need for Digital Geneva Convention
., 2017.
Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security
. United Nations General Assembly, 2015.
Fact Sheet: President Xi Jinping’s State Visit to the United States
. The White House, Office of the Press Secretary, 2015.
Regulation (EU) 2016/679 of the European Parliament and of the Council
., 2016.
Directive (EU) 2016/1148 of the European Parliament and of the Council
., 2016.
Regulation (EU) No 910/2014 of the European Parliament and of the Council
., 2014.
Regulation (EU) 2019/881 of the European Parliament and of the Council
. ENISA, 2019.
Europol
.
Botnet Taken Down through International Law Enforcement Cooperation
., 2019.
Transformation, NATO Allied Com
.
Lock Your Shields and Brace for Impact
., 2013.
Pages
« първа
‹ предишна
…
380
381
382
383
384
385
386
387
388
…
следваща ›
последна »
372819 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance