Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Cavelty, Myriam Dunn
.
Critical information infrastructure: vulnerabilities, threats and responses
In
Disarmament Forum
., 2007.
Gupta, Sandeep
,
BS Dhaliwal
, and
Rahul Malhotra
.
"
All-Embracing Review Of Wireless Network Protocol, Optimum Network Simulator
."
International Journal of Computer & Organization Trends
3, no. 3 (2013).
Ferris, John
.
"
After the RMA: Contemporary Intelligence, Power and War
." In
The Ashgate Research Companion to Modern Warfare
. London: Routledge, 2010.
Hansel, Mischa
.
"
Stuxnet und die Sabotage des iranischen Atomprogramms: Ein neuer Kriegsschauplatz im Cyberspace?
" In
Handbuch Kriegstheorien
, 564-576. Wiesbaden: VS Verlag für Sozialwissenschaften, 2011.
Dickow, Marcel
,
Mischa Hansel
, and
Max M. Mutschler
.
"
Präventive Rüstungskontrolle – Möglichkeiten und Grenzen mit Blick auf die Digitalisierung und Automatisierung des Krieges
."
Sicherheit und Frieden (S+F) / Security and Peace
33, no. 2 (2015): 67-73 .
Cavelty, Myriam Dunn
.
"
Die materiellen Ursachen des Cyberkriegs Cybersicherheitspolitik jenseits diskursiver Erklärungen
."
Journal of self-regulation and regulation
01 (2015).
Cavelty, Myriam Dunn
.
"
Cyber(Un)Sicherheit: Grundlagen, Trends und Herausforderungen
."
Polit Bild
(2012).
Lakomy, Miron
.
Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw
. Vol. 21. Katowice: Wydawnictwo Uniwersytetu Śląskiego, 2015.
Dunn, Myriam A.
.
"
Securing the Information Age The Challenges of Complexity for Critical Infrastructure Protection and IR Theory
." In
International Relations and Security in the Digital Age
. London: Routledge, 2007.
Cavelty, Myriam Dunn
.
Critical Information Infrastructure Protection, Overview
. ETH Zurich, Switzerland.: Center for Security Studies (CSS), 2008.
Jones, Calvert W.
.
Online Impression Management: Case studies of activist Web sites and their credibility enhancing tactics during the Kosovo conflict
In
School of Information Management and Systems
. University of California at Berkeley, 2005.
Oppermann, Daniel
.
"
Virtual attacks and the problem of responsibility: the case of China and Russia
."
Carta Internacional
5, no. 2 (2010).
Oppermann, Daniel
.
Governança multisetorial e o processo de governança da internet: Um estudo de caso sobre crime cibernético e filtragem na internet entre 1990 e 2010
In
Instituto de Relações Internacionais (IREL)
. Vol. Programa de Doutorado. Universidade de Brasília, 2012.
Vieira, Vivian Patricia P.
.
Os Efeitos da Comunicação Digital na Dinâmica do Ativismo Transnacional Contemporâneo: Um Estudo Sobre Al-Qaeda, Wikileaks e Primavera Árabe
In
Instituto De Relações Internacionais
. Vol. Programa De Pós-Graduação Em Relações Internacionais. Brasília: Universidade De Brasília, 2016.
da Costa, Manuel Artur Corr
.
O ciberespaço como nova dimensão nos conflitos
In
Departamento De Estudos Pós-Graduados, Curso De Promoção A Oficial Superior Da Força Aérea
. Pedrouços: Instituto Universitário Militar, 2017.
Rawnsley, Gary D.
.
"
Old Wine in New Bottles: China-Taiwan Computer-Based 'Information Warfare' and Propaganda
."
International Affairs (Royal Institute of International Affairs 1944-)
81, no. 5 (2005): 1061-1078 .
Carafano, James Jay
.
Wiki at War: Conflict in a Socially Networked World
. USA: Texas A&M University Press, 2011.
Libicki, Martin C.
.
Cyberspace in Peace and War
. Naval Institute Press, 2016.
Wang, Zhenzi
,
Zhi-Qiang Liu
, and
Steve Fore
.
"
Facing the Challenge: Chinese Television in the New Media Era
."
Media International Australia
114, no. 1 (2005): 135-146.
Zhou, Xiang
.
Framing the Internet in China: Cross-Cultural Comparisons of Newspapers’ Coverage in China, Hong Kong, Singapore, the United States, and the United Kingdom
. Vol. PhD. University of Tennessee, 2006.
Osahenvemwen, O. A.
, and
Ogbeide K. O.
.
"
The Role of Internet and Effects on Nigerians
."
International Journal of Engineering Innovation & Research
3, no. 4 (2014).
Ventre, Daniel
.
"
Le rapport Mandiant et la perception américaine de la menace chinoise
."
Dans Sécurité globale
1, no. 23 (2013): 53-64.
Svete, Uroš
.
Novi izzivi za obramboslovje - obrambne in varnostne razsežnosti uporabe informacijske tehnologije
., 2004.
Cavelty, Myriam Dunn
.
"
Cyber-Terror– Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate
."
Journal of Information Technology & Politics
4, no. 1 (2007).
Cavelty, Myriam Dunn
.
"
From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse
."
International Studies Review
15 (2013): 105-122.
Pages
« първа
‹ предишна
…
330
331
332
333
334
335
336
337
338
…
следваща ›
последна »
385196 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all