Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
K¨onig, Philip
,
Fabian Obermann
,
Kevin Mallinger
, and
Alexander Schatten
.
Root Cause Analysis of Software Aging in Critical Information Infrastructure
., 2022.
Shalamanov, Velizad
, and
Borislav Bankov
.
"
NATO Cyber Defence Policy and Hybrid Threats: The Way to Enhance Our Resilience
." In
NATO Science for Peace and Security Series - D: Information and Communication Security
. Vol. Volume 61: Building Cyber Resilience against Hybrid Threats., 2021.
McCants, Nicholas
.
The Resource Allocation Process and the Effects on Cybersecurity Culture
In
. Vol. Doctor of Information Technology. Capella University.
Tosun, Petek
.
"
Transforming Universities for a More Competent Society: Digitalization and Higher Education
." In
Multidisciplinary Perspectives Towards Building a Digitally Competent Society
, 230-247., 2022.
Kaushik, Keshav
.
"
Blockchain Enabled Artificial Intelligence for Cybersecurity Systems
." In
Big Data Analytics and Computational Intelligence for Cybersecurity
, 165-179. Cham: Springer, 2022.
Karagiannis, Stylianos
.
Systematic Design, Deployment and Evaluation of Gamified Cybersecurity Learning Environments
In
Department of Informatics
. Corfu, Greece: Ionian University, 2022.
Scott, Nicholas V.
.
A Theoretical Formulism for Evidential Reasoning and Logic Based Bias Reduction in Geo-Intelligence Processing
In
4 th International Conference on Statistics: Theory and Applications (ICSTA'22)
. Prague, Czech Republic, 2022.
Barahona, Carolina del Rocio
.
Martens Clause: application in the context of Cyberwar
In
Facultad de Jurisprudencia
. Pontificia Universidad Católica del Ecuador, 2022.
Courtain, Sylvain
.
Essays on network data analysis through the bag-of-paths framework
In
Louvain Research Institute in Management and Organizations Louvain School of Management
. Vol. Doctor of Philosophy in Economics and Management Sciences. Université catholique de Louvain, 2022.
Dowse, Andrew
, and
Sascha Dov Bachmann
.
"
Information warfare: methods to counter disinformation
."
Defense & Security Analysis
(2022).
Giannino, Marco
.
Money Laundering and Terrorist Financing through Cryptocurrency
. Vol. Master of Science in Financial Crimes and Compliance Management. Utica University, 2022.
Dash, Bibhu
,
Meraj Farheen Ansari
,
Pawankumar Sharma
, and
Azad Ali
.
"
Threats and opportunities with ai-based cyber security intrusion detection: a review
."
International Journal of Software Engineering & Applications (IJSEA)
13, no. 5 (2022).
Ansari, Meraj Farheen
,
Bibhu Dash
,
Pawankumar Sharma
, and
Nikhitha Yathiraju
.
"
The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review
."
International Journal of Advanced Research in Computer and Communication Engineering
11, no. 9 (2022).
Poškus, Armandas
.
Kibernetinio saugumo galimybių tyrimas
. Vol. Bakalauro. Vilnius: Generolo Jono Žemaičio Lietuvos karo akademija, 2022.
Hazari, Sunil
.
"
Investigation of generational differences in advertising behaviour and fake news perception among Facebook users
."
Int. J. Internet Marketing and Advertising
17, no. 1/2 (2022).
Sharma, Muskan
.
Cyber Terrorism and How Internet is Used to Propagate it
In
Legal Readings, "A Platform for Learning"
., 2021.
Aferudin, Farouq
, and
Kalamullah Ramli
.
"
The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia
."
Budapest International Research and Critics Institute-Journal (BIRCI-Journal)
5, no. 3 (2022): 22859-22872.
Spasic, A. J.
,
D. S. Jankovic
,
P. J. Rajkovic
, and
D. S. Aleksic
.
"
Programme-Sensitive Modifications of Generalized Net Model of Software-Intensive Production of Stereoscopic Multimedia Content
."
Journal of Computer and Systems Sciences International
61 (2022): 824-842.
Альперт, Софія Іоган
.
"
Новітній підхід до застосування теорії дезера – смарандаке при класифікуванні емляного покриву під час проведення дистанційного зондування із використанням безпілотних літальних апаратів
."
Управління розвитком складних систем
49 (2022).
Feriz, Larisa
.
"Duboki" i "mračni" internet
In
Faculty of Humanities and Social Sciences
. University of Zagreb, 2022.
Hoyte, Trudee
,
Anil Ali
, and
Adilah Mahabir
.
"
A Preliminary Study Investigating the Impact of the COVID-19 Pandemic on Dental Education in the Caribbean: A Student’s Perspective
."
Oral
2 (2022): 251-262.
Belletti, Federico
.
Las operaciones de ciberguerra y su contribución al logro de los objetivos del nivel operacional: caso de estudio el accionar de Rusia contra Ucrania
. Argentina: Escuela Superior de Guerra Conjunta de las Fuerzas Armadas, 2021.
Chambers, Michael David
.
Exploring the Standards Cybersecurity Practitioners Need to Comply with Multinational Cybersecurity Requirements
. Vol. Doctor of Computer Science. Colorado Technical University, 2022.
Narankotuwa, Kusal Madusanka
.
Effects on Perceived Productivity for Remote Workplace: Case Study during the COVID-19 Pandemic
In
Graduate School
. Kasetsart University, 2021.
Thangavel, Kathiravan
,
ordan Joseph Plotnek
,
Alessandro Gardi
, and
Roberto Sabatini
.
Understanding and investigating adversary threats and countermeasures in the context of space cybersecurity
In
Conference: AIAA/IEEE 41st Digital Avionics Systems Conference (DASC)
. Portsmouth, VA, USA, 2022.
Pages
« първа
‹ предишна
…
509
510
511
512
513
514
515
516
517
…
следваща ›
последна »
311475 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance