Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
ENISA & ITE
.
Information Sharing and Analysis Centers (ISACs) Cooperative Models
. European Union Agency for Network and Information Security, 2017.
White, Greg
, and
Rick Lipsey
.
ISAO SO Product Outline
. ISAO Standards Organization, 2016.
Electrical Technology
.
Internet of Things (IOT) and Its Applications in Electrical Power Industry
., 2016.
National Institute of Standards and Technology
.
Guide for Conducting Risk Assessments
. Vol. SP 800-30 Rev. 1, Publication 800-30. Gaithersburg, MD: U.S. Department of Commerce, 2012.
Information Technology — Security Techniques — Information security Management for Inter-sector and Inter-organizational Communications
., 2015.
Guide to Cyber Threat Information Sharing
In
NIST Special Publication
. Gaithersburg, MD: National Institute of Standards and Technology, 2016.
Pernik, Piret
,
Jesse Wojtkowiak
, and
Alex Verschoor-Kirss
.
National Cyber Security Organization: United States
. Tallinn: NATO CCD COE, 2016.
Bigelow, Brad
.
"
The Topography of Cyberspace and Its Consequences for Operations
." In
10th International Conference on Cyber Conflict
. Tallinn: NATO CCD COE, 2018.
Bakis, Bruce J.
, and
Edward D. Wang
.
Building a National Cyber Information-Sharing Ecosystem
. MITRE Corporation, 2017.
NESA
.
EP3R 2013 – Position Paper of the EP3R Task Forces on Trusted Information Sharing (TF-TIS
. European Union Agency for Network and Information Security, 2013.
NESA
.
Public Private Partnerships (PPP) Cooperative models
. European Union Agency for Network and Information Security, 2017.
Migration and Home Affairs
. Information exchange, European Commission, 2019.
Commission, European
.
Joint Communication to The European Parliament, The Council, The European Economic and Social Committee and The Committee of the Regions
. Brussels, 2013.
Commission, European
.
EU-U.S. Privacy Shield: stronger protection for transatlantic data flows
. Brussels, 2016.
NIS Directive
In
Homepage of European Union Agency for Network and Information Security
., 2019.
Lehto, Martti
,
Jarno Limnéll
,
Tuomas Kokkomäki
,
Jouni Pöyhönen
, and
Mirva Salminen
.
Kyberturvallisuuden strateginen johtaminen Suomessa
In
Julkaisusarja
. Helsinki: Valtioneuvoston kanslia, 2018.
Fovino, Igor Nai
,
Ricardo Neisse
,
Alessandro Lazari
,
Gian-Luigi Ruzzante
,
Nineta Polemi
, and
Malgorzata Figwer
.
European Cybersecurity Centres of Expertise Map – Definitions and Taxonomy
. Luxembourg: Publications Office of the European Union, 2018.
Yin, Robert K.
.
Study Research, Design and Methods
. 5th ed. Thousand Oaks: Sage Publications, 2014.
Skopik, Florian
,
Giuseppe Settanni
, and
Roman Fiedler
.
"
A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing
."
Computers and Security
60 (2016).
Skorupka, Clement W.
, and
Lindsley G. Boiney
.
Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations
. MITRE Corporation, 2016.
MITRE Corporation
.
Cyber Information-Sharing Models: An Overview
., 2012.
Datsenko, Liudmyla
,
Oleksii Mikhno
, and
Mykola Molochko
.
"
Education in Geomatics for First Line Emergency Management in Ukraine
."
Information & Security: An International Journal
40, no. 2 (2018): 205-211.
Hevner, Alan
, and
Samir Chatterjee
.
Design research in information systems: theory and practice
. New York: Springer Science and Business Media, 2010.
MARISA
.
MARISA Maritime Integrated Surveillance Awareness
., 2018.
March, Salvatore T.
, and
Gerald F. Smith
.
"
Design and natural science research on information technology
."
Decision Support Systems
15, no. 4 (1995): 251-266.
Pages
« първа
‹ предишна
…
385
386
387
388
389
390
391
392
393
…
следваща ›
последна »
372873 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance