Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Sifat, Mhamud Hussen
,
Safwat Mukarrama Choudhury
,
Sajal K. Das
,
Hafiz Ahamed
,
S.M. Muyeen
,
Mehedi Hasan
,
Firoj Ali
,
ZinatT asneem
,
Manirul Islam
,
Robiul Islam
et al.
"
Towards electric digital twin grid: Technology and framework review
."
Journal Pre-proof
(2022).
Sifata, Mhamud Hussen
,
Safwat Mukarrama Choudhury
,
Sajal K. Das
,
Hafiz Ahamed
,
S. M. Muyeen
,
Mehedi Hasan
,
Firoj Ali
,
Zinat Tasneem
,
Manirul Islam
,
Robiul Islam
et al.
Towards Electric Digital Twin Grid: Technology and Framework Review
., 2022.
Erbasli, Seyma Nur Yildir
.
Conversation-Based Assessments: Measuring Student Learning with Human-Like Communication
In
Department of Educational Psychology
. Vol. Doctor of Philosophy. University of Alberta, 2022.
Jimoh, Rasheed Gbenga
,
Olayinka Olufunmila Olusanya
,
Joseph Bamidele Awotunde
,
Agbotiname Lucky Imoize
, and
Cheng-Chi Lee
.
"
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases
."
Future Internet
14, no. 305 (2022).
Vivek, Yelleti
,
Vadlamani Ravi
,
Abhay Anand Mane
, and
Laveti Ramesh Naidu
.
"
Explainable Artificial Intelligence and Causal Inference based ATM Fraud Detection
."
arXiv preprint arXiv:2211.10595
(2022).
Соколов, Сергей Валер
.
"
Государственная Информационная Политика в Библиотечной Отрасли Украины на Современном Этапе
."
Библиография и Книговедение
4, no. 441 (2022): 141-160.
Hillman, Velislava
.
The State of Cybersecurity in Education: Voices from the EdTech Sector
. London: Media@LSE, London School of Economics and Political Science ("LSE"), 2022.
Bladaitė, Neringa
.
Visuomeninio saugumo neapibrėžtumas: NATO mažųjų valstybių atvejis
. Vol. Daktaro disertacija socialiniai mokslai,politikos mokslai. Vilnius : Vilniaus Universitetas, 2022.
Ivančík, Radoslav
, and
Jana Müllerová
.
Dezinformácie ako hybridná hrozba šírená prostredníctvom sociálnych sietí
. Agentúrou na podporu výskumu a vývoja, 2022.
Sharkov, George
.
"
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
."
Information & Security: An International Journal
49 (2021): 49-69 .
Sharkov, George
.
"
A System-of-Systems Approach to Cyber Security and Resilience
."
Information & Security: An International Journal
37 (2017): 69-94.
Hodges, J.
,
C. Jackson
, and
A. Barth
.
HTTP strict transport security
., 2012.
Sharkov, George
, and
Christina Todorova
.
"
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
."
Information & Security: An International Journal
37 (2017): 95-102.
Blagoev, Ivan
.
Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems
., 2022.
Yusof, I.
, and
A.S.K. Pathan
.
"
Mitigating cross-site scripting attacks with a content security policy
."
Computer
3, no. 49, (3) (2016): 56-63.
Tennoe, Mariam T.
, and
Susan F. Henssonow
.
Padding (Cryptography) Paperback
., 2010.
Meyers, Mike
,
Scott Jernigan
, and
Mike Meyers
.
CompTIA Security+ Certification Guide
. 3rd ed. , Third Edition (Exam SY0-601) 3rd Edition, , 2021.
Blagoev, Ivan
.
Application of Time Series Techniques for Random Number Generator Analysis
In
XXII Int. Conference DCCN
. Moscow, Russia, 2019.
Stuttard, Dafydd
, and
Marcus Pinto
.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
., 2007.
Hankerson, Darrel
,
Alfred J. Menezes
, and
Scott Vanstone
.
"
Guide to Elliptic Curve Cryptography
."
Springer Professional Computing
(2004).
General Security Requirements for Equipment Using the Data Encryption Standard
., 1982.
Calzarossa, M.C.
, and
L. Massari
.
Analysis of header usage patterns of HTTP request messages
In
16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems
., 2014.
Porebski, Jakub
.
Occupancy grid environmental modeling for automotive applications
In
Automatics, Computer Science and Biomedical Engineering Department of Automatic Control and Robotics
. Vol. Doctoral Dissertation. Kraków : AGH University of Science and Technology Faculty of Electrical Engineering, 2022.
Ivančík, Radoslav
.
"
Specific Education of Students of The Academy of Police Force in the Field of Security Management
." In
Medzinárodná vedecká konferencia „Nové trendy profesijnej prípravy v Ozbrojených silách“
. Liptovský Mikuláš, 2022.
Nganga, Allan
,
Joel Scanlan
,
Margareta Lützhöft
, and
Steven Mallam
.
Timely Maritime Cyber Threat Resolution in a Multi-Stakeholder Environment
In
CYBER 2022 : The Seventh International Conference on Cyber-Technologies and Cyber-Systems
., 2022.
Pages
« първа
‹ предишна
…
511
512
513
514
515
516
517
518
519
…
следваща ›
последна »
296076 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance