Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
ENISA
.
CSIRT Maturity - Self-assessment Tool
., 2021.
ENISA
.
NCSS: Practical Guide on Development and Execution
., 2021.
International Telecommunication Union(ITU)
.
The Global Cybersecurity Index
., 2018.
Institute of Internal Auditors
.
Internal audit capability model (IA-CM) for the public sector: overview and application guide
. Altamonte Springs, 2009.
National Capabilities Assessment Framework
. European Union Agency for Cybersecurity (ENISA), 2020.
White, Gregory
.
"
The Community Cyber Security Maturity Model
." In
40th Hawaii International International Conference on Systems Science (HICSS-40 2007)
. Waikoloa, Big Island, HI, USA, 2007.
Davis, Brigit L.
.
Anticipating Social Movement National Security Threats: Social Media Content’s Potential in Developing a Structured Analytical Model
. Vol. Doctorate in Strategic Security. National American University, 2021.
Zukic, Anes
.
Assessing the Role of the Military in National Cybersecurity Efforts
In
Faculty of the U.S. Army Command and General Staff College
. Vol. Master of Military art and science. Ankara, Turkey: Land Forces Military Academy, 2009.
Iqbal, Ishtiaq
,
Sonia Afroz
, and
Intisar Kabir
.
"
Plan a Condensed Risk Model using Fuzzy Logic for Natural Disaster Management
."
International Journal of Engineering Research & Technology (IJERT)
10, no. 04 (2021).
Garba, Adamu Abdullahi
,
Fathe Jeribi
,
Ibrahim Al-Shourbaji
,
Mohammed Alhameed
,
Faheem Reegu
, and
Sophia Alim
.
"
An Approach To Weigh Cybersecurity Awareness Questions In Academic Institutions Based On Principle Component Analysis: A Case Study Of Saudi Arabia
."
International Journal of Scientific & Technology Research
10, no. 04 (2021).
Доценко, C. І.
,
Є. В. Брежнєв
, and
Є. М. Будніченко
.
"
Natural intellectual systems: contradictions of methodologies of integrated and systematic approaches and ways to overcome them
."
Radioelectronic and Computer Systems
1, no. 97 (2021).
Захаренко, Костянтин Волод
.
Інституційний Вимір Інформаційної Безпеки України: Трансформаційні Виклики, Глобальні Контексти, Стратегічні Орієнтири
. Vol. Дисертація. Київ: Національний Педагогічний Університет Імені М. П. Драгоманова, Львівський Національний Університет Імені Івана Франка, 2021.
Теленик, Сергій Сергі
.
Адміністративно-Правове Регулювання Державної Системи Захисту Критичної Інфраструктури України
In
Запорізький Національний Університет
. Vol. Дисертація. Запоріжжя: Національна Академія Внутрішніх Справ, 2021.
Omanwa, James M.
.
Mobile Network Infrastructure Security in Developing Countries – A Kenya Case Study
In
College of Management and Technology
. Vol. doctoral study. Walden University , 2021.
Rollberg, Peter
.
"
Football, film, and the Russian state
." In
Russia and the 2018 FIFA World Cup
. Routledge, 2021.
Hadwer, Ali Al
,
Madjid Tavanab
, and
Dan Gillis
.
"
A Systematic Review of Organizational Factors Impacting Cloud-based Technology Adoption Using Technology-Organization-Environment Framework
."
Internet of Things
(2021).
Lorenzoni, Nina
, and
Margit Raich
.
"
Long-term impact of the Galtuer avalanche on the public health system
."
Journal of Emergency Management
19, no. 2 (2021).
Bhagat, Chandan
,
Bharat Sharma
, and
Anjay Kumar Mishra
.
"
Assessment of E Governance for National Development – A Case Study of Province 1 Nepal
."
East African Scholars Journal of Engineering and Computer Sciences
4, no. 4 (2021).
Korpihalkola, Joni
,
Tuomo Sipola
, and
Tero Kokkonen
.
Color-Optimized One-Pixel Attack Against Digital Pathology Images
In
Proceedings of the 29th Conference of Open Innovations Association FRUCT
. Vol. 29.1. Tampere, Finland, 2021.
Sipola, Tuomo
, and
Tero Kokkonen
.
"
One-pixel attacks against medical imaging: a conceptual framework
." In
Trends and Applications in Information Systems and Technologies (WorldCIST 2021)
, 197-203. Vol. 1365. Cham, Switzerland: Springer, 2021.
Thompson, Pat
, and
Mark Manning
.
"
Missed Opportunities in Digital Investigation
." In
Privacy and Freedom Protection in the Connected World. Advanced Sciences and Technologies for Security Applications
, 101-122. Cham. : Springer, 2021.
Bhardwaj, Sanjay K.
.
"
India’s energy security contours
." In
The Chinese Shadow on India’s Eastward Engagement
. 1st Edition ed. India: Routledge , 2021.
Promvek, K.
.
"
Southeast Asia’s raising energy demand Central Asia and the BRI
." In
China’s Belt and Road Initiative: The Impact on Sub-regional Southeast Asia
. 1st Edition ed. Routledge, 2021.
Gurley, Ryan Christophe
.
Strategies for Implementing Self-service Technologies in Supermarket Retail Operations
In
College of Management and Technology
. Vol. Doctor of Business Administration. Walden University, 2021.
Babeshko, Ievgen
,
Kostiantyn Leontiiev
,
Vyacheslav Kharchenko
,
Andriy Kovalenko
, and
Eugene Brezhniev
.
Application of Assumption Modes and Effects Analysis to XMECA
In
Proceedings of the Sixteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX
. Wrocław, Poland, 2021.
Pages
« първа
‹ предишна
…
491
492
493
494
495
496
497
498
499
…
следваща ›
последна »
351956 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance