Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Modern Methods and Means of Analysing and Controlling the Risks of the CRAMM Company’s System Security, RiskWatch in HRYF
., 2004.
Bulbula, Dilek
,
Hendrik Hakenes
, and
Claudia Lambert
.
"
What Influences Banks’ Choice of Credit Risk Management Practices
."
Theory and Evidence
40 (2019): 1-14.
Dudykevych, Valeriy
,
Ivan Prokopyshyn
,
Vasyl Chekurin
,
Ivan Opirskyy
,
Yuriy Lakh
,
Taras Kret
,
Yevheniia Ivanchenko
, and
Ihor Ivanchenko
.
"
A Multicriterial Analysis of the Efficiency of Conservative Information Security Systems
."
Eastern-European Journal of Enterprise Technologies
3, no. 9(99) (2019): 6-13.
Saaty, Thomas L.
, and
Luis G. Vargas
.
Decision Making with the Analytic Network Process: Economic, Political, Social and Technological Applications with Benefits, Opportunities, Costs and Risks
. Springer, 2013.
Zaslavskyi, Volodymyr
,
Kateryna Krasovska
, and
Maya Pasichna
.
"
Application of the Method of Analysis of Hierarchies in Solving the Problem of Diversification of the Composition of the Portfolio of Electricity Generation
."
Visnyk Kyivskoho universytetu, Seriia: Fizyko-matematychni nauky
2 (2017): 123-131.
Izmailova, Olha
,
Sofiia Pyda
,
Iryna Melnyk
, and
Kateryna Krasovska
.
"
Improving the Reliability of the Values of the Significance of Criteria in Determining the Market Value of Real Estate Objects
."
Upravlinnia rozvytkom skladnykh system
29 (2017): 109-118.
Dragaš, Orhan
, and
Zoran Dragišić
.
"
Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19
."
Information & Security: An International Journal
48, no. 2 (2021): 213-225.
Menga, XianJia
,
Shi Qiub
,
Shaohua Wanc
,
Keyang Chengd
, and
Lei Cuia
.
"
A motor imagery EEG signal classification algorithm based on recurrence plot convolution neural network
."
Pattern Recognition Letters
146 (2021): 134-141.
Reilly, Ronan Eric
.
“The truth is in doubt here!”: Critically Assessing Sources and Information in a Conspiratorial World
In
Institute of Media and Communication
. Vol. Master’s Thesis in Journalism. Universitetet i Oslo, 2020.
Khoroshko, Volodymyr
,
Zhukov Anatoly
, and
Latko Iryna
.
"
Research of Processes Occurring with Information Counter-Fighting in Modern Conditions
."
Scientific and practical cyber security journal
(2021).
Поночовний, Юрій Леоні
.
Методологічні основи та інформаційні технології забезпечення гарантоздатності інформаційно-керуючих систем з багатоцільовим обслуговуванням
. Vol. Автореферат дисертації на здобуття наукового ступеня доктора технічних наук. Харків: Національний Технічний Університет, «Харківський Політехнічний Інститут», 2021.
Petrivskyi, Volodymyr
,
Viktor Shevchenko
,
Oleksiy Bychkov
,
Maksym Brazhenenko
, and
Pavel Petrov
.
CAD technology for optimal territory covering
In
2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)
. Lviv, Ukraine: IEEE, 2021.
Pfeifer, Tomáš
.
Kurdská menšina a Strana spravedlnosti a rozvoje Turecka: Příčiny sekuritizace “kurdské otázky”
. Vol. Diplomová práce. Praha: Vysoká škola CEVRO Institut, 2020.
Ivanchenko, Oleg
,
Eugene Brezhniev
,
Ihor Kliushnikov
, and
Boris Moroz
.
"
Cloud Simulation and Virtualization for Testing of Critical Energy Infrastructure Components
."
International Journal of Computing
20, no. 1 (2021): 119-128.
Tso, Chen-Dong
.
"
Five. Digital Media and the Transformation of Politics in Taiwan
." In
New Challenges for Maturing Democracies in Korea and Taiwan
. Stanford University Press , 2014.
Thom, Jay
,
Yash Shah
, and
Shamik Sengupta
.
Correlation of Cyber Threat Intelligence Data Across Global Honeypots
In
2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC)
. NV, USA: IEEE Institute of Electrical and Electronics Engineers, 2021.
Fachrie, Muhammad
.
Kementerian Pendidikan dan Kebudayaan Universitas Riau Fakultas Ilmu Sosial dan Ilmu Politik Pekanbaru
In
Jurusan Ilmu Hubungan Internasional Fakultas Ilmu Sosial Dan Ilmu Politik
. Universitas Riau Pekanbaru , 2013.
Shen, Yeming
,
Thomas C. Sharkey
,
Boleslaw K. Szymanski
, and
William Wallacea
.
"
Interdicting Interdependent Contraband Smuggling, Money and Money Laundering Networks
."
Socio-Economic Planning Sciences
(2021).
Di Martino, Luigi
.
"
Fear and empathy in international relations: Diplomacy, cyber engagement and Australian foreign policy
."
Place Branding and Public Diplomacy
(2021).
Meacham, Lisa
.
Security Theater: A Phenomenological Study of How Individuals Experience Passenger Screening Canines
In
Department of Doctoral Studies
. Vol. Doctor of Computer Science. Colorado Technical University, 2021.
Beveridge, Robert
.
Efficacy of Increasing Realism in Cybersecurity Training
. Vol. Ph.D. Robert Morris University, 2021.
Drozd, Oleksandr
,
Olena Ivanova
,
Kostiantyn Zashcholkin
,
Vitaliy Romankevich
, and
Julia Drozd
.
Checkability Important for Fail-Safety of FPGA-based Components in Critical Systems
In
IntelITSIS’2021: 2nd International Workshop on Intelligent Information Technologies and Systems of Information Security
. Khmelnytskyi, Ukraine, 2021.
Bandara, Indra
,
Chitra Balakrishna
, and
F. Ioras
.
The Need For Cyber Threat Intelligence For Distance Learning Providers And Online Learning Systems
In
2021 INTED2021 Proceedings
., 2021.
Nussbaum, Brian
, and
Jeffery Ernest Doherty
.
"
Italy’s Guardia di Finanza: policing financial crime and domestic security in a changing world
."
Journal of Financial Crime
(2021).
Phillips, Peter J.
, and
Gabriela Pohl
.
"
Countering Intelligence Algorithms: Decision Theory, Design Choices and Counter-AI
."
The RUSI Journal
165, no. 7 (2020).
Pages
« първа
‹ предишна
…
482
483
484
485
486
487
488
489
490
…
следваща ›
последна »
352002 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance