Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Национален статистически институт
., 2020.
Timberg, Craig
.
"
Net of Insecurity: A Flaw in the Design
."
The Washington Post
(2015).
Eddy, Nathan
.
"
Gartner: 21 Billion IoT Devices to Invade By 2020
."
Information Week
(2015).
Khan, Rafiullah
,
Sarmad Ullah Khan
,
Rifaqat Zaheer
, and
Shahid Khan
.
Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges
In
Proceedings of 2012 10th International Conference on Frontiers of Information Technology (FIT)
. Institute of Electrical and Electronics Engineers, 2012.
Yu, Tianlong
,
Vyas Sekar
,
Srinivasan Seshan
,
Yuvraj Agarwal
, and
Chenren Xu
.
Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things
In
Proceedings of the 14th ACM Workshop on Hot Topics in Networks (ACM)
., 2015.
HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack
. HP News, 2014.
Federal Trade Commission
.
Internet of Things: Privacy and Security in a Connected World
In
FTC Staff Report
., 2015.
Meltzer, Joshua P.
.
"
The Internet, Cross-Border Data Flows and International Trade
."
SSRN Electronic Journal
(2013).
Tang, Wenfang
, and
Shanto Iyengar
.
Political Communication in China: Convergence or Divergence Between the Media and Political System?
. London: Routledge, 2012.
Dalha, Tenzin
.
Assertion of China’s Sovereignty over the Internet
. global-is-asian, 2018.
Shahbaz, Adrian
.
Freedom on the Net 2018: The Rise of Digital Authoritarianism
. Freedom House, 2018.
Sherman, Justin
.
"
How to Regulate the Internet Without Becoming a Dictator
."
Foreign Policy
(2019).
Saakashvili, Eduard
.
The Global Rise of Internet Sovereignty
. .coda, 2019.
Valeriano, Brandon
,
Benjamin Jensen
, and
Ryan C. Maness
.
Cyber Strategy: The Evolving Character of Power and Coercion
. Oxford Scholarship Online, 2018.
Kerttunen, Mika
, and
Eneken Tikk
.
Strategically Normative. Norms and Principles in National Cybersecurity Strategies
In
EU Cyber Direct
., 2019.
United States Cyber Command
.
Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command
., 2018.
NATO Warns Russia of ‘Full Range’ of Responses to Cyberattack
. Security Week, 2019.
Clarke, Richard A.
, and
Robert K. Knake
.
Cyberwar: The Next Threat to National Security and What to Do About It
. New York, NY: Harper Collins, 2010.
Goel, Sanjay
, and
Hany A. Shawky
.
"
Estimating the Market Impact of Security Breach Announcements on Firm Values
."
Information & Management
46, no. 7 (2009): 404-410.
Clapper, James R.
,
Marcel Lettre
, and
Michael S. Rogers
.
Joint Statement for the Record to the Senate Armed Services Committee ‘Foreign Cyber Threats to the United States’
., 2017.
Schaap, Arie J.
.
"
Cyber Warfare Operations: Development and Use Under International Law
."
Air Force Law Review
64 (2009): 121-173.
Dévai, Dóra
.
"
Proliferation of Offensive Cyber Weapons. Strategic Implications and Non-Proliferation Assumptions
."
Academic and Applied Research in Military and Public Management Science (AARMS)
15, no. 1 (2016): 61-73.
Leiner, Barry M.
.
"
A Brief History of the Internet
."
ACM SIGCOMM Computer Com¬mu¬nication Review
39, no. 5 (2009): 22-31.
Armstrong, Helen L.
, and
Patrick J. Forde
.
"
Internet Anonymity Practices in Computer Crime
."
Information Management and Computer Security
11, no. 5 (2003): 209-215.
Goel, Sanjay
.
"
Anonymity vs. Security: The Right Balance for the Smart Grid
."
Communications of the Association for Information Systems
36, no. Article 2 (2015): 23-32.
Pages
« първа
‹ предишна
…
398
399
400
401
402
403
404
405
406
…
следваща ›
последна »
372991 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance