Philip Spassov

Introduction

Short CV

Insert CV here

Full profile

This is the longer CV, presenting education, work experience, etc.

Publications
Cormen, Thomas, Charles Leiserson, Ronald Rivest, and Clifford Stein. "Section 24.3: Dijkstra's algorithm." In Introduction to Algorithms, 595-601. Second ed. MIT Press and McGraw–Hill, 2001.
Polanczyk, Maciej, Michal Strzelecki, and Krzysztof Slot. "Lee-algorithm based path replanner for dynamic environments." In 2012 International Conference on Signals and Electronic Systems (ICSES). Wroclaw, Poland, 2012.
Klenke, Achim. Probability Theory: A Comprehensive Course. Springer Science & Business Media, 2013.
Petrivskyi, Volodymyr, Victor Shevchenko, Oleksiy Bychkov, and Maksym Brazhenenko. Information technology of the increasing sensors term of use considering their movement In 2020 IEEE XVIth International Conference on the Perspective Technologies and Meth-ods in MEMS Design (MEMSTECH). Lviv, Ukraine, 2020.
DiRenzo, Joseph, Dana A. Goward, and Fred S. Roberts. "The little-known challenge of maritime cyber security." In 6th International Conference on Information, Intelligence, Systems and Applications (IISA)., 2015.
Cybersecurity in the shipping industry(link is external) In Capital Link Cyprus Shipping Forum, Deloitte., 2019.
Baskar, Kala, and Mahesh Balakris. "Cyber Preparedness in Maritime Industry." nternational Journal of Scientific and Technical Advancements 5, no. 2 (2019): 19-28.
Hyra, Bartlomiej. Analyzing the Attack Surface of Ships(link is external) In DTU Compute Department of Applied Mathematics and Computer Science . Kongens Lyngby: Technical University of Denmark, 2019.
Abraham, Subil, and Suku Nair. "A Predictive framework for cybersecurity analytics using attack graphs." International Journal of Computer Networks & Communications (IJCNC) 7, no. 1 (2015).
Kim, Dohoon. "Decision-Making Method for Estimating Malware Risk Index." Applied Sciences 9, no. 22 (2019): 4943.
Munro, Ken. Hacking, tracking, stealing and sinking ships(link is external). Pen Test Partners, Blog: Maritime Cyber Security, 2018.

Pages

Last updated: Monday, 01 December 2014