Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
(active tab)
Full profile
Publications
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Ubuntu documentation
(link is external)
. Instalation/System Requirements, 2020.
Build an easy RDP Honeypot with Raspberry PI 3 and Observe the Infamous Attacks
(link is external)
. Medium.com, 2019.
RPi HardwareHistory
(link is external)
. RPi Hub, 2020.
Cenys, Antanas
,
Darius Rainys
,
Lukas Radvilavicius
, and
Andrej Bielko
.
"
Development of Honeypot System Emulating Functions of Database Server
." In
RTO IST Symposium on “Adaptive Defence in Unclassified Networks”
. Toulouse, France, 2004.
Fan, Wenjun
,
Zhihui Du
,
David Fernandez
, and
Víctor A. Villagrá
.
"
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey
."
IEEE Systems Journal
12, no. 4 (2018): 3906-3919.
Oudot, Laurent
.
Wireless Honeypot Countermeasures
(link is external)
. Broadcom, 2004.
Streif, Rudolf
.
Microcontroller versus System-on-Chip in Embedded System Designs
(link is external)
. CTO - ibeeto, 2019.
HoneyESP
(link is external)
. MIT licensed, 2020.
SQLite3 Arduino library for ESP32, Apache 2.0 licensed
(link is external)
., 2020.
Tagarev, Todor
.
Digital Transformation, Cyber Security and Resilience, Information & Security: An International Journal
., 2019.
Tagarev, Todor
,
Krassimir Atanassov
,
Vyacheslav Kharchenko
, and
Janusz Kasprzyk
.
Digital Transformation, Cyber Security and Resilience of Modern Societies
. Cham: Springer, 2020.
Shalamanov, Velizar
,
Nikolai Stoianov
, and
Yantsislav Yanakiev
.
DIGILIENCE 2020: Governance, Human Factors, Cyber Awareness, Information & Security: An International Journal
., 2020.
Kahn, Herman
.
On Thermonuclear War
. Princeton: Princeton University Press, 1960.
Doyle, James E.
.
"
Why Eliminate Nuclear Weapons?
"
Survival
55, no. 1 (2013): 7-34.
de Castella, Tom
.
How Did We Forget about Mutually Assured Destruction?
(link is external)
. BBC News, 2012.
Cox, Jessica
.
"
Nuclear Deterrence Today
(link is external)
."
NATO Review
(2020).
Lunn, Simon
, and
Nicholas Williams
.
The Demise of the INF Treaty: What Are the Consequences for NATO
(link is external)
In
Policy Brief, European Leadership Network
., 2019.
Reif, Kingston
.
"
New START at a Glance
(link is external)
." (2020).
Hodges, Ben
,
Janusz Bugajski
, and
Peter B. Doran
.
Securing the Suwałki Corridor: Strategy, Statecraft, Deterrence, and Defense
. Washington, DC: Center for European Policy Analysis, 2018.
Lanoszka, Alexander
.
"
Russian Hybrid Warfare and Extended Deterrence in Eastern Europe
."
International Affairs
92, no. 1 (2016): 175-195.
Radin, Andrew
.
Hybrid Warfare in the Baltics: Threats and Potential Responses
. Santa Monica, CA: RAND, 2017.
Apps, Peter
.
Commentary: Putin’s Nuclear-tipped Hybrid War on the West
(link is external)
. Reuters, 2018.
Gressel, Gustav
.
Protecting Europe against Hybrid Threats
(link is external)
In
Policy Brief
. European Council on Foreign Relations, 2019.
Davis, Paul K.
.
"
Deterrence, Influence, Cyber Attack, and Cyber War
."
New York University Journal of International Law and Politics
47, no. 2 (2014): 327-355.
Hammond, Martin
.
The Peloponnesian War
. Oxford: Oxford University Press, 2009.
Pages
« първа
‹ предишна
…
445
446
447
448
449
450
451
452
453
…
следваща ›
последна »
378840 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance
Back to top