Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Li, Wei
,
Cheng-shu Wu
, and
Su-mei Ruan
.
"
CUS-RF-Based Credit Card Fraud Detection with Imbalanced Data
."
Journal of Risk Analysis and Crisis Response
12, no. 3 (2022): 110-123 .
Thangavel, Kathiravan
,
ordan Joseph Plotnek
,
Alessandro Gardi
, and
Roberto Sabatini
.
Understanding and investigating adversary threats and countermeasures in the context of space cybersecurity
In
Conference: AIAA/IEEE 41st Digital Avionics Systems Conference (DASC)
. Portsmouth, VA, USA, 2022.
Garcia, Gabriel
.
A política externa dos Estados Unidos de Barack Obama a Donald Trump (2013/2020) na revista Foreign Affairs: uma análise por meio da Teoria Crítica
. Vol. Mestrado em andamento em Relações Internacionais . Universidade Estadual Paulista Júlio de Mesquita Filho, 2022.
Karakuş, Muhammed
, and
Ömer Ak
.
"
Pornification of the Cyberspace during intrastate conflicts: VNSAs, recruitment strategies and the changing role of women in the turbulence of violence
." In
Fighting for Empowerment in an Age of Violence
. IGI Global , 2022.
Simeon, Lesley Amol
.
"
The Human Rights Oversight in Ensuring Energy Security
."
PDEU Journal of Energy and Management
5, no. 1-2 (2020).
Trauthig, Inga K.
,
Katlyn Glover
,
Zelly Martin
,
Anastasia Goodwin
, and
Samuel Woolley
.
Polarized Information Ecosystems and Encrypted Messaging Apps: Insights into Egypt, Ethiopia, and Libya
. Center for Media Engagement Moody College of Communication The University of Texas at Austin, 2022.
Turlubekova, Zhaniya
.
"
Pushed against the Wall: The Fight against Drug-Related Corruption in Kazakhstan
."
Communist and Post-Communist Studies
55, no. 3 (2022): 119-139.
Matejić, Ivica
, and
Mihailo Ćurčić
.
"
The Role of Electronic Payments in Money Laundering
." In
Security Challenges of Modern Society: Dilemmas and implications
. Niš, Beograd, Banja Luka: University „Union-Nikola Tesla“,Belgrade Institute for Humanities and Social Research, Independent University of Banja Luka, 2022.
Castilho-Grao, Erica
,
Betsy Laxton
,
Dave B. Miller
, and
Ben D. Sawyer
.
Managing Research Remotely: Lessons Learned and Best Practices from a Case Study in a Research Lab during COVID19
In
Proceedings of the 7th North American International Conference on Industrial Engineering and Operations Management,
. Orlando, Florida, USA, 2022.
de la Vallée, Paloma
,
Georgios Iosifidis
,
Andrea Rossi
,
Marco Dri
, and
Wim Mees
.
Sector-Specific Training - A Federated Maritime Scenario
In
International Conference on Multimedia Communications, Services and Security MCSS 2022: Multimedia Communications, Services and Security
. Cham: Springer, 2022.
Samosa, Resty C.
,
Killy Neah C. Amondina
,
Rhicca D. Camposano
,
Angelica P. Ruadiel
,
Christine Joy P. Rayuan
, and
Nicole Joy Y. Soledad
.
"
Virtual Laboratory as a Self-Paced Learning Innovation to Improve Learning Achievements and Attitudes in Teaching Physical Science
."
British Journal of Innovation in Science, Research and Development
01, no. 02 (2022).
Giedraitytė, Vidmantė
.
"
Interinstitutional and Cross-Sectorial Collaboration to Ensure Security
." In
Europe Alone: Small State Security Without the United States
. Rowman & Littlefield Publishers, 2022.
Ruoslahti, Harri
, and
Ilkka Tikanmäki
.
E-Skills in Cybersecurity
In
International Conference on Multimedia Communications, Services and Security, MCSS 2022: Multimedia Communications, Services and Security
. Cham: Springer, 2022.
Ding, Xinyi
,
Zohreh Raziei
,
Eric C. Larson
,
Eli V. Olinick
,
Paul Krueger
, and
Michael Hahsler
.
"
Swapped face detection using deep learning and subjective assessment
."
EURASIP Journal on Information Security
2020, no. 6 (2020).
Niemiec, Marcin
,
Salvatore Marco Pappalardo
,
Maya Bozhilova
,
Nikolai Stoianov
,
Andrzej Dziech
, and
Burkhard Stiller
.
Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities
In
International Conference on Multimedia Communications, Services and Security, MCSS 2022: Multimedia Communications, Services and Security
. Vol. 1689. Cham: Springer, 2022.
de la Vallée, Paloma
,
Georgios Iosifidis
,
Andrea Rossi
,
Marko Dri
, and
Wim Mees
.
Sector-Specific Training-A Federated Maritime Scenario
In
International Conference on Multimedia Communications, Services and Security, MCSS 2022: Multimedia Communications, Services and Security
., 2022.
Kuzmanov, Atanas
, and
Venelin Georgiev
.
Catalog of Human Factor Roles in Cyberspace
In
IT4Sec Reports
., 2022.
Kouka, Marianna
, and
Mariah Cristina Magallanes
.
Technological Trivergence and International Trade: A Literature Review
. Harvard University, 2022.
Yevseiev, Serhii
,
Ruslan Hryshchuk
,
Kateryna Molodetska
,
Mariia Nazarkevych
, and
Volodymyr Hrytsyk
.
Modeling of Security Systems for Critical Infrastructure Facilities
., 2022.
Dimitrov, Michael Minev
.
"
Analysis of strategic stakeholders in the Western Balkans
."
Security and Defence Quarterly
(2022).
Alzarooni, Abdelrahim
, and
Mohammed Lataifeh
.
Exploring the relationship between IT competence and digital transformation within government projects in the UAE
In
2022 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)
. Dalian, China, 2022.
Ашурков, И.С.
,
Н.А. Лешко
, and
А.В. Тимошенко
.
"
Современное Состояние и Перспективы Развития Многообзорных Методов Траекторной Обработки Радиолокационной Информации при Использовании TBD-Технологии
."
Вестник Воздушно-Космической Обороны
3, no. 35 (2022): 50-61.
Ali, Atif
,
Yasir Khan Jadoon
,
Muhammad Qasim
,
Muhammad Shahid Iqbal
,
Asma
, and
Muhammad Usama Nazir
.
Secure Software Development: Infuse Cyber Security to Mitigate Attacks in an Organization
In
International Conference on Engineering Software for Modern Challenges ESMoC 2021: Engineering Software for Modern Challenges
., 2021.
Yan, Xiaolong
, and
Yingying Feng
.
"
Secure wireless network system based on deep reinforcement learning network
."
Optik
271 (2022).
Selvaraj, Yuvaraj
.
Safety Proofs for Automated Driving using Formal Methods
In
Department of Electrical Engineering Chalmers
. Vol. doctor of philosophy. Sweden: University of Technology Gothenburg, 2022.
Pages
« първа
‹ предишна
…
510
511
512
513
514
515
516
517
518
…
следваща ›
последна »
296267 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance