Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Executive Order — Improving Critical Infrastructure Cybersecurity
. The White House, Office of the Press Secretary, 2013.
PricewaterhouseCoopers LLP
.
Why You Should Adopt the NIST Cybersecurity Framework
., 2014.
Tworek, Heidi
.
Microsoft Is Right: We Need A Digital Geneva Convention
In
Opinion
., 2017.
Poryazov, Stoyan
,
Dmytro Progonov
,
Emiliya Saranova
, and
Zlatogor Minchev
.
Performance Prediction in Secure Telecommunication System with Quality of Service Guarantees
In
The 9th International Conference on Business Information Security (BISEC-2017)
. Belgrade, Serbia, 2017.
Poryazov, Stoyan
,
Dmytro Progonov
, and
Emiliya Saranova
.
"
Quality of Telecommunications as a Composition of Qualities of Subservices, Including Security and Trusted Third Parties
." In
2017 25th Telecommunication Forum (TELFOR)
. Belgrade, Serbia, 2017.
Boulton, Clint
.
What is Digital Transformation? A Necessary Disruption
. CIO, 2019.
Beck, Ulrich
.
Risk Society. Towards a New Modernisation
. London: SAGE, 1992.
Beck, Ulrich
.
"
Cosmopolitical Realism: On the Distinction Between Cosmopolitanism in Philosophy and the Social Sciences
."
Global Networks
4, no. 2 (2004): 131-156.
Fovino, Igor Nai
,
Ricardo Neisse
,
Alessandro Lazari
,
Gian-Luigi Ruzzante
,
Nineta Polemi
, and
Malgorzata Figwer
.
European Cybersecurity Centres of Expertise Map - Definitions and Taxonomy
. Luxembourg: Publications Office of the European Union, 2018.
von Solms, Rossouw
, and
Johan Van Niekerk
.
"
From Information Security to Cyber Security
."
Computers & Security
38 (2013): 97-102.
Berki, Eleni
,
Juri Valtanen
,
Sunil Chaudhary
, and
Linfeng Li
.
"
The Need for Multi-Disciplinary Approaches and Multi-Level Knowledge for Cybersecurity Professionals
." In
Multidisciplinary Perspectives on Human Capital and Information Technology Professionals
, 72. IGI Global, 2018.
Schneier, Bruce
.
"
Semantic Attacks: The Third Wave of Network Attacks
."
Crypto-Gram
(2000).
McClain, Jonathan
,
Austin Silva
,
Glory Emmanuel
,
Benjamin Anderson
,
Kevin Nauer
,
Robert Abbott
, and
Chris Forsythe
.
"
Human Performance Factors in Cyber Security Forensic Analysis
."
Procedia Manufacturing
3 (2015): 5301-5307.
Kraemer, Sara
,
Pascale Carayon
, and
John Clem
.
"
Human and Organizational Factors in Computer and Information Security: Pathways to Vulnerabilities
."
Computers and Security
28 (2009): 509-520.
Universities, Cyber Security C.
.
Cyber Security Competencies: Cyber Security Education and Research in Finnish Universities
In
14th European Conference on Cyber Warfare & Security
. Hatfield, UK: University of Hertfordshire, 2015.
Kolb, Alice Y.
, and
David A. Kolb
.
"
Experiential Learning Theory: A Dynamic, Holistic Approach to Management Learning, Education and Development
." In
The SAGE Handbook of Management Learning, Education and Development
, 13. SAGE Publications, 2009.
Kaplan, Bonnie
, and
Joseph Alex Maxwell
.
"
Qualitative Research Methods for Evaluating Computer Information Systems
." In
Evaluating Health Care Information Systems: Methods and Applications
, 45-68. Thousand Oaks, CA: Sage, 1994.
Boland, R.
.
"
Phenomenology: A Preferred Approach to Research in Information Systems in Research Methods
." In
Information Systems
, 193-201. Amsterdam: North Holland, 1985.
Kolb, Alice Y.
, and
David A. Kolb
.
"
Learning Styles and Learning Spaces: Enhancing Experiential Learning in Higher Education
."
Academy of Management Learning & Education
4, no. 2 (2005): 193-212.
Lindgren, Robb
, and
Mina Johnson-Glenberg
.
"
Emboldened by Embodiment: Six Precepts for Research on Embodied Learning and Mixed Reality
."
Educational Researcher
42 (2013): 445-452.
K. Lawlor, Blaine
, and
Martin J. Hornyak
.
"
Smart Goals: How the Application of Smart Goals Can Contribute to Achievement of Student Learning Outcomes
."
Developments in Business Simulation and Experiential Learning
29 (2012).
Gonzalez, III, Joaquin Jay
, and
Roger L. Kemp
.
Cybersecurity: Current Writings on Threats and Protection
. Jefferson, NC: McFarland, 2019.
Spanish National Cybersecurity Institute
.
Cyber Exercises Taxonomy
., 2015.
Tadda, George
,
John J. Salerno
,
Douglas Boulware
,
Michael Hinman
, and
Samuel Gorton
.
Realizing Situation Awareness within a Cyber Environment
In
Defense and Security Symposium
. Vol. 6242. Orlando (Kissimmee), Florida, United States, 2006.
Jajodia, Sushil
,
Peng Liu
,
Vipin Swarup
, and
Cliff Wang
.
Cyber Situational Awareness
. New York: Springer, 2010.
Pages
« първа
‹ предишна
…
381
382
383
384
385
386
387
388
389
…
следваща ›
последна »
372821 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance