Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Rose, Michael
.
21st Century Statecraft and the Return of Great Power Competition: An Interagency Framework for Non-Traditional Threats
In
AWC Fellows Strategy Research Project
. Duke University, 2019.
Halliday, Alexander
.
The Study of Russo-Baltic Disinformation and Information Manipulation in Contemporary News Media
. Vol. MSc International Security, Intelligence and Strategic Studies (SECINTEL). Praha: Univerzita Karlova, 2018.
Samuilova, Simona
.
"
Disinformation in the Ideological Race during the Cold War and its Heritage
."
Bulgarian Historical Review / Revue Bulgare d'Histoire
1-2 (2018): 155-178.
Vona, Simone
.
La Russia in Guerra
. Vol. tesi di laurea. Università del Piemonte orientale, 2016.
Afeltowicz, Łukasz
, and
Krzysztof Pietrowicz
.
Solutionist interventions and their unforeseen consequences: a preliminary catalogue of often commited errors
In
2018 II National Interdisciplinary Scientific Conference TechSpo’18: Power of Algorithms
. Krakow, Poland , 2018.
Breitenbauch, Henrik
, and
Niels Byrjalsen
.
"
Subversion, Statecraft and Liberal Democracy
."
Survival Global Politics and Strategy
61, no. 4 (2019).
Odunuga, Sesan Adeolu
.
Soft-Containment and Politics of Relevance. Conceiving a New Dimension of EU-Russia Relations
In
Scientific Study
. GRIN Verlag, 2018.
Xia, Yiping
,
Josephine Lukito
,
Yini Zhang
,
Chris Wells
,
Sang Jung Kim
, and
Chau Tong
.
"
Disinformation, performed: self-presentation of a Russian IRA account on Twitter
."
Publication Cover Journal Information, Communication & Society
22, no. 11 (2019).
Asghar, Muhammad Rizwan
,
Qinwen Hu
, and
Sherali Zeadally
.
"
Cybersecurity in Industrial Control Systems: Issues, Technologies, and Challenges
."
Computer Networks
165 (2019): 106946.
Che, Liang
,
Xuan Liu
, and
Zuyi Li
.
"
Fast Screening of High-Risk Lines under False Data Injection Attacks
."
IEEE Transactions on Smart Grid
10, no. 4 (2019): 4003-4014.
Svilicic, Boris
,
Junzo Kamahara
,
Jasmin Celic
, and
Johan Bolmsten
.
"
Assessing Ship Cyber Risks: A Framework and Case Study of ECDIS Security
."
WMU Journal of Maritime Affairs
18, no. 3 (2019): 509-520.
MAGERIT version 3: Methodology of Analysis and Risk Management Information Systems
. Madrid: Ministry of Finance and Public Administration, 2012.
Risk management – Principles and Guidelines
In
ISO
., 2009.
Information technology – Security techniques – Information Security Risk Management
., 2008.
NIST
.
Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
In
NIST Special Publication
. Gaithersburg, MD: National Institute of Standards and Technology , 2018.
"
Council Directive 2008/114/EC of 8 December 2008 on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection
."
Official Journal
L 345 (2008): 75-82.
Universal Task List
. Vol. version 2.1. Washington, D.C.: U.S: Department of Homeland Security, 2005.
Caudle, Sharon L.
.
"
Homeland Security Capabilities-Based Planning: Lessons from the Defense Community
."
Homeland Security Affairs
1, no. 2 (2005).
"
Capability-Based Planning
." In
The TOGAF® Standard
. Vol. Version 9.2., 2008.
Shoemaker, Dan
,
Anne Kohnke
, and
Ken Sigler
.
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce 2.0
. Boca Raton, FL: CRC Press, 2016.
"
Integrating the Disaster Risk Management Cycle
." In
Science for DRM 2020: Acting Today, Protecting Tomorrow
. Ispra, Italy: Disaster Risk Management Knowledge Centre, 2020.
ISO/IEC
.
Information technology – Security techniques – Information security management systems – Requirement
., 2013.
Ganin, Alexander A.
,
Phuoc Quach
,
Mahesh Panwar
,
Zachary A. Collier
,
Jeffrey M. Keisler
,
Dayton Marchese
, and
Igor Linkov
.
"
Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management
."
Risk Analysis
40, no. 1 (2020): 183-199.
Council, National Research
.
Review of the Department of Homeland Security’s Approach to Risk Analysis
. Washington, DC: The National Academies Press, 2010.
Simmons, Chris
,
Charles Ellis
,
Sajjan Shiva
,
Dipankar Dasgupta
, and
Qishi Wu
.
AVOIDIT: A Cyber Attack Taxonomy
In
Technical Report
. University of Memphis, 2009.
Pages
« първа
‹ предишна
…
404
405
406
407
408
409
410
411
412
…
следваща ›
последна »
373073 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance