Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
G. Ramirez-Hernandez, Renée
.
Community College Software Deployment Success Rate: A Delphi Qualitative Case Study
In
Information Systems and Technology
. Vol. Doctor of Management. University of Phoenix , 2020.
Efe, Ahmet
.
"
It Based Innovation at the Management Mindset of Organisations
."
Dijital Çağda İşletmecilik Dergisi
3, no. 2 (2020).
Penchev, Georgi
, and
Velizar Shalamanov
.
"
Design of A Bulgarian National Academic Cyber Network In The NATO
." In
Information Security in Education and Practice
. Cambridge Scholars Publishing, 2021.
Sharkov, George
,
Yavor Papazov
,
Christina Todorovaa
,
Georgi Koykov
, and
Georgi Zahariev
.
"
Cybersecurity Tools for Threat Intelligence and Vulnerability Monitoring for National and Sectoral Analysis
." In
Information Security in Education and Practice
. Cambridge Scholars Publishing, 2020.
Kaloyanova, Kalinka
.
"
Towards Requirements for Cybersecurity Curricula
." In
Information Security in Education and Practice
. Cambridge Scholars Publishing, 2020.
Leontiiev, Kostiantyn
,
Ievgen Babeshko
, and
Vyacheslav Kharchenko
.
Assumption Modes and Effect Analysis of XMECA: Expert based safety assessment
In
2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)
. Kyiv, Ukraine, 2020.
Okazaki, Hiroyuki
,
Shogo Shimura
,
Ki Miyamoto
,
Ki Watanabe
,
Yuichi Fuda
, and
Yasuyuki Murakami
.
"
Practice of cryptographic education using formal security verification tools and the issues of e-Learning teaching materials
."
J-STAGE
37, no. 1 (2020).
Vyas, Deepak G.
,
Niyati Trivedi
,
Vivek Pandya
,
Praghnesh Bhatt
, and
Ajit Pujara
.
Future Challenges and Issues in Evolution of the Smart Grid and Recommended Possible Solutions
In
2019 IEEE 16th India Council International Conference (INDICON)
. Rajkot, India, 2019.
Russo, Enrico
,
Gabriele Costa
, and
Alessandro Armando
.
Scenario Design and Validation for Next Generation Cyber Ranges
In
2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)
. Cambridge, MA, USA, 2018.
Alloghani, Mohamed
,
Dhiya Al-Jumeily
,
Abir Hussain
,
Jamila Mustafina
,
Thar Baker
, and
Ahmed J. Aljaaf
.
"
Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities to Cyber Attacks
." In
Nature-Inspired Computation in Data Mining and Machine Learning. Studies in Computational Intelligence
., 2020.
Fernández-Caramés, Tiago M.
, and
Paula Fraga-Lamas
.
"
Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases
."
Sensors
20, no. 11 (2020): 3048.
Rahouti, Mohamed
.
"
Board 128: Understanding Global Environment for Network Innovations (GENI) and Software-defined Networking (SDN) for Computer Networking and Security Education
." In
2019 ASEE Annual Conference & Exposition
. Tampa, Florida, 2019.
van der Velde, Dennis
,
Martin Henze
,
Philipp Kathmann
,
Erik Wassermann
,
Michael Andres
,
Detert Bracht
,
Raphael Ernst
,
George Hallak
,
Benedikt Klaer
,
Philipp Linnartz
et al.
"
Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
."
arXiv:2003.06185 [
(2020).
Rahouti, Mohamed
, and
Kaiqi Xiong
.
A Customized Educational Booster for Online Students in Cybersecurity Education. M Rahouti, K Xiong - CSEDU (2), 2019
In
Proceedings of the 11th International Conference on Computer Supported Education (CSEDU 2019)
., 2019.
Hurst, W.
,
N. Shone
,
Q. Shi
, and
B. Bazli
.
"
MICRO-CI: A Testbed for Cyber-Security Research
." In
EMERGING 2016: The Eighth International Conference on Emerging Networks and Systems Intelligence
., 2016.
Hurst, W.
,
N. Shone
,
Q. Shi
, and
B. Bazli
.
"
Micro-CI: A Model Critical Infrastructure Testbed for Cyber-Security Training and Research
."
International Journal On Advances in Security
10, no. 1&2 (2017): 114-125.
Suryotrisongko, Hatma
, and
Yasuo Musashi
.
"
Review of Cybersecurity Research Topics, Taxonomy and Challenges: Interdisciplinary Perspective
." In
2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA)
. Kaohsiung, Taiwan, 2019.
Easttom, Chuck
.
Incorporating Cybersecurity Engineering Within The Discipline Of Systems Engineerin
. Vol. Master of Science. University of Texas at El Paso, 2019.
Prvan, Marina
, and
Julije Ožegovć
.
"
Methods in Teaching Computer Networks: A Literature Review
."
ACM Transactions on Computing Education
20, no. 3 (2020).
Maahs, Doreen Lynn
.
Managerial Strategies Small Businesses Use to Prevent Cybercrime
. Vol. Doctor of Business Administration (D.B.A.). Walden University, 2018.
Burrell, Darrell Norman
,
Ashley Dattola
,
Maurice E. Dawson
, and
Calvin Noble
.
"
A Practical Exploration of Cybersecurity Faculty Development With Microteaching
."
International Journal of Applied Management Theory and Research (IJAMTR)
1, no. 1 (2019).
Hurst, William
,
Fosso Wamba Samuel
,
Huang Jen-Fa
, and
Wen-Piao Lin
.
"
Micro-CI: A Critical Systems Testbed for Cyber-Security Research
." In
EMERGING 2016
., 2016.
Beveridge, Robert
.
"
Effectiveness of Increasing Realism Into Cybersecurity Training
."
International Journal of Cyber Research and Education (IJCRE)
2, no. 1 (2020).
Sánchez, Julia
,
Adrià Mallorqui
,
Alan Briones
,
Agustín Zaballos
, and
Guiomar Corral
.
"
An Integral Pedagogical Strategy for Teaching and Learning IoT Cybersecurity
."
Sensors
20, no. 14 (2020): 3970.
Randall, Gerald
.
Factors Influencing Adoption of Laboratory Virtualization for College and University Cybersecurity Degree Programs: A Correlational Study
. Capella University, 2020.
Pages
« първа
‹ предишна
…
472
473
474
475
476
477
478
479
480
…
следваща ›
последна »
352036 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance