Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Bessant, John
, and
Howard Rush
.
Approaches to Benchmarking: the case of ‘framework conditions’ and ICT-Os
. Brighton, UK: Centre for Research in Innovation Management, University of Brighton, 1999.
Fagerberg, Jan
.
The potential of benchmarking as a tool for policy learning
In
IPTS Report
., 2003.
Dévai, Katalin
,
Eamon Cahill
, and
Norbert Gallagher
.
"
RECORD’s Brighton conference – a summary
." In
A methodology for benchmarking RTDI organisations in CEE
. Brighton-Budapest, 2002.
Argyris, Chris
.
Knowledge for action: A guide to overcoming barriers to organizational change
. San Francisco: Jossey-Bass, 1993.
Senge, Peter
.
The Fifth Discipline – The Art & Practice of a Learning Organization
. New York: Doubleday, 1990.
Childre, Doc Lew
.
Cut-thru: Achieve Total Security and Maximum Energy: A Scientifically Proven Insight on How to Care Without Becoming a Victim
. Boulder Creek, Calif.: Planetary Publications, 1996.
McCarthy, Kathleen
.
"
Uncertainty is a Blessing, Not a Bane
."
APA Monitor
(1994): 28.
Apiecionek, Łukasz
, and
Michał Romantowski
.
"
Secure IP Network Model, Computational Method
."
Science and Technology
19, no. 4 (2013): 209-213.
Information Exchange Gateways: Reference Architecture
In
A Nexor White Paper
. Nexor, 2009.
Extensible Messaging and Presence Protocol (XMPP): Core (RFC 3920)
. Jabber Software Foundation, 2004.
Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence (RFC 3921)
. Jabber Software Foundation, 2004.
Vision 2020: Bulgaria in NATO and the European Defence
. Sofia: Ministry of Defence, 2014.
Nikolov, Rumen
.
Prospects for the Development of the Bulgarian Armed Forces in the Face of Hybrid Threats ( in Bulgarian)
In
Lecture at the “G.S. Rakovski” National Defence Academy, Sofia
., 2015.
Dimov, Petko
.
"
Main Characteristics of the Operations’ Environment and Algorithm of Hybrid War (in Bulgarian)
."
Military Journal
123, no. 1 (2016): 86-96.
Clark, Richard
, and
Robert Nake
.
World War III: what will it be like? High Technologies in the Service of Militarism (in Russian)
. Piter, 2011.
5. Meyers, Adam
.
Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units
. CrowdStrike, 2016.
Cisco CCNA Introduction to Networks course
. Cisco Networking Academy, 2016.
"
Hybrid Warfare: Briefing to the Subcommittee on Terrorism, Unconventional Threats and Capabilities
." Committee on Armed Services, House of Representatives, 2014.
"
EW Aircraft: Survive for a ‘Thick Veil’ of Interference (in Russian)
."
Army News
(2014).
"
Complex EW 'Krasukha - 4' (in Russian)
."
Military Review, News VPK
(2013).
Sushentsov, Andrey
.
"
Russian ‘Hybrid War’: Nothing New (in Russian)
."
Foreign Policy
(2015).
'Mercury' in the Russian army forces (Russian)
. Krasfun.ru, 2014.
The president-C 'averted a missile away from a Russian Mi-8 in Syria (in Russian)
. EurAsia Daily, 2016.
December 2015 Ukraine power grid cyberattack
. Wikipedia, 2015.
Alimov, Timur
.
"
’Alabuga’ will make useless enemy equipment (in Russian)
."
Russian weapons
(2014).
Pages
« първа
‹ предишна
…
281
282
283
284
285
286
287
288
289
…
следваща ›
последна »
386749 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all