Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Nasirov, Elman
, and
Khayal Iskandarov
.
"
The Prospects of Azerbaijan to Enhance Military Interoperability with NATO
."
Connections: The Quarterly Journal
16, no. 4 (2017): 89-99.
Kaura, Vinay
.
"
India’s Counter-Terrorism Policy against Jihadist Terror: Challenges and Prospects
."
Connections: The Quarterly Journal
16, no. 4 (2017): 51-67.
Nicolson, Dasha
.
"
Foreign Terrorist Fighters from the North Caucasus: Understanding Islamic State Influence in the Region
."
Connections: The Quarterly Journal
16, no. 4 (2017): 69-88.
Chincholkar, Y. D.
, and
Ayush Kumar
.
"
Traffic Sign Board Detection for Advanced Driver Assistance Systems and Autonomous Vehicles
."
Automation and Autonomous System
10, no. 6 (2018).
Chincholkar, Y. D.
, and
Ayush Kumar
.
"
Traffic Sign Board Detection for Advanced Driver Assistance Systems and Autonomous Vehicles
."
Automation and Autonomous System
10, no. 6 (2018).
Selvi, P.Pandi
, and
T.Meyyappan
.
"
A New Approach for the Recognition of Characters from Vehicle Number Plate Images using K Nearest Neighbor Classifier and Enhanced Artificial Neural Network
."
International Journal of Pure and Applied Mathematics
118, no. 7 (2018).
Shires, James
.
"
Enacting Expertise: Ritual and Risk in Cybersecurity
."
Politics and Governance
6, no. 2 (2018): 31-40.
Bossong, Raphael
.
"
Critical Infrastructure and Critical Information Infrastructure Protection: The Hew Frontier of EU Internal Security
." In
Challenges and Critiques of the EU Internal Security Strategy: Rights, Power and Security
. Cambridge, 2017.
Tag Archives: technology
. ATW Learn, Wordpress.com, 2012.
Kovačević, Božo
.
"
Cyberwar – Američka Izlika za Novi Hladni Rat?
"
Polemos
16, no. 2 (2013): 91-110.
Bossong, Raphael
.
"
The European Programme for the protection of critical infrastructures–meta-governing a new security problem?
"
European Security
23, no. 2 (2014).
Read, Oliver
.
"
How the 2010 Attack on Google Changed the US Government’s Threat Perception of Economic Cyber Espionage
." In
Cyberspace and International Relations
, 203-230 . Berlin, Heidelberg : Springer, 2014.
Soyer, Hubert
.
"
Internet Science Risk, Risk Perception, and Cyberwar
."
Network Architectures and Services
(2013).
Lawson, Sean
.
"
Putting the “war” in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States
."
First Monday
17, no. 7 (2012): 49-73.
Satija, Siddhant
, and
Prabhakar Shukla
.
"
Consumer Behaviour and Adoption of M-Commerce
."
AGU International Journal of Management Studies & Research
6 (2018).
Fariborzi, Elham
, and
Hoda Anvari Kazemabad
.
"
The Security of Information in Financial Transactions via Mobile: Algorithms
."
International Journal of Computer Networks and Communications Security
1, no. 6 (2013): 257-263.
de Amorim, Wellyngton Silva
,
Isabela Blasi Valduga
,
João Marcelo Pe Ribeiro
,
Victoria Guazzelli Williamson
,
Grace Ellen Krauser
,
Mica Katrina Magtoto
, and
José Baltazar S. Guerra
.
"
The nexus between water, energy, and food in the context of the global risks: An analysis of the interactions between food, water, and energy security
."
Environmental Impact Assessment Review
72 (2018): 1-11.
Rogito, Pauline Kemunto
.
Multi-Tiered Security Architecture for Information Infrastructure Protection in Selected Commercial Banks in Kenya
In
School of Science and Technology
. Vol. Master of Science in Information Systems and Technology. Africa: United States International University, 2017.
Setiawan, Ahmad Budi
.
"
Peningkatan Keamanan Supervisory Control and Data Acquisition (Scada) Pada Smart Grid Sebagai Infrastruktur Kritis
."
Jurnal Penelitian Pos & Informatika
6, no. 1 (2016).
Setiawan, Ahmad Budi
.
"
Kajian Strategi Pengamanan Infrastruktur Sumber Daya Informasi Kritis
."
Buletin Pos dan Telekomunikasi
13, no. 1 (2015): 43-60.
Nagyfejeo, Eva
.
"
Transatlantic collaboration in countering cyberterrorism
." In
Terrorism Online: Politics, Law and Technology
., 2015.
Njotini, MN
.
"
Protecting Critical Databases–Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa
."
Potchefstroom Electronic Law Journal
16, no. 1 (2013).
NATO
.
Operations and Missions: Past and Present
., 2018.
Guiding Principles for Stabilization & Reconstruction
. Washington, D.C.: United States Institute of Peace, United States Army Peacekeeping and Stability Operations Institute, 2009.
Information Sharing with non-NATO Entities
. NATO Joint Analysis and Lessons Learned Centre, 2012.
Pages
« първа
‹ предишна
…
290
291
292
293
294
295
296
297
298
…
следваща ›
последна »
386625 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all