Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Hamida, Yaou
,
Baina Amine
, and
Bellafkih Mostafa
.
"
Toward resilience management in critical information infrastructure
." In
2015 5th World Congress on Information and Communication Technologies (WICT)
. Marrakech, Morocco : IEEE, 2015.
Ahmad, Arniyati
.
A cyber exercise post assessment framework: In Malaysia perspectives
In
School of Computing Science, College of Science and Engineering
. Vol. Doctor of Philosophy. University of Glasgow, 2016.
von Solms, R
, and
B von Solms
.
"
National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
." In
Iccws 2015 - The Proceedings of the 10th International Conference on Cyber Warfare and Security
. South Africa, 2015.
Amideo, Annunziata Esposito
, and
Maria Paola Scaparra
.
A Synthesis of Optimization Approaches for Tackling Critical Information Infrastructure Survivability
In
Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science
. Vol. 10242. Paris, France , 2017.
Gelbstein, Eduardo E.
.
"
Designing a Security Audit Plan for a Critical Information Infrastructure (CII)
." In
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
, 262-285., 2013.
Setiawan, Ahmad Budi
.
"
Peningkatan Keamanan Supervisory Control and Data Acquisition (Scada) Pada Smart Grid Sebagai Infrastruktur Kritis
."
Jurnal Penelitian Pos dan informatika
6, no. 1 (2016).
Martins, José
,
Henriques dos Santos
, and
Paulo Nunes
.
"
Modelo de Segurança da Informação para Organizações Militares em Ambiente de Guerra de Informação
."
Proelium (Revista Científica da Academia Militar)
VII (2012): 31-66.
Musarurwa, Alfred
, and
Husin Jazri
.
"
A Proposed Framework to Measure Growth of Critical Information Infrastructure Protection in Africa
." In
Conference: International Conference on Emerging Trends in Network and Computer Communication
. Namibia, 2014.
Martin, Ioana
.
Critical Information Infrastructure Protection: Towards Global Cyber Security
In
Regional Department of Defense Resources Management Studies
. Romanian National Defense University, 2014.
Herrera, Luis-Carlos
, and
Olaf Maennel
.
"
A comprehensive instrument for identifying critical information infrastructure services
."
International Journal of Critical Infrastructure Protection
25 (2019): 50-61.
Deliverable D7.1: Review of the State-of-the-Art in Cyberattacks
In
Seventh Framework Programme Information & Communication Technologies Trustworthy ICT, Network of Excellence
., 2011.
Velasquez, Luis Carlos Her
.
A Comprehensive Instrument for Identifying Critical Information Infrastructure Services
In
Institute of Computer Science, Cyber Security Curriculum
. Vol. Master’s Thesis. University of Tartu, 2016.
Njotini, MN
.
"
Protecting Critical Databases: Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa
."
Potchefstroom Electronic Law Journal
16, no. 1 (2013).
Unger, Brigitte
, and
Johan den Hertog
.
"
Water always finds its way: Identifying new forms of money laundering
."
Crime, Law and Social Change
57, no. 3 (2012): 287-304.
Odi, Nwankwo
, and
Onyekachi Richard Eze
.
"
Electronic Payment in Cashless Economy of Nigeria: Problems and Prospect
."
Journal of Management Research
5, no. 1 (2013).
Tsakalidis, George
, and
Kostas Vergidis
.
"
A Systematic Approach Toward Description and Classification of Cybercrime Incidents
."
IEEE Transactions on Systems, Man, and Cybernetics: Systems
(2017): 1-20.
Correia, Pedro Miguel Alv
, and
Inês Oliveira A. de Jesus
.
"
Combate às transferências bancárias ilegítimas pela Internet no direito português: entre as experiências domésticas e políticas globais concertadas
."
Revista Direito GV
12, no. 2 (2016).
Mehmet, Murad
, and
Duminda Wijesekera
.
"
Ontological Constructs to Create Money Laundering Schemes
." In
STIDS 2010 Proceedings
., 2010.
Dumitrache, AA
,
A Boroi
, and
F Pusca
.
Recent technological tendencies of money laundering
In
Annals of DAAAM & Proceedings
. Vienna: DAAAM International, 2011.
Tsakalidis, George
.
Camco a framework for classification, analysis & monitoring cybercrime-related offences
. Vol. Master’s Thesis. University of Macedonia, 2016.
Romani, Alessia
.
Money laundering and financial crimes: a comparison between criminal and legal firms
In
Dipartimento di Scienze Economiche
. Vol. Magistrale in Business Administration. Universita‟ Degli Studi Di Padova , 2016.
Onyeagba, Justus B. C.
, and
Ilokanulo N. Samuel
.
"
Impact of Cashless Banking System of Payment on Entrepreneurial Activities in Anambra State
."
IJMPAS
1, no. 2 (2015).
Cheng, Zi-Yao
,
Yun Liu
,
Chin-Chen Chang
, and
Chen-Xu Liu
.
"
A Novel Biometric-Based Remote User Authentication Scheme Using Quadratic Residues
."
International Journal of Information and Electronics Engineering
3, no. 4 (2013).
Amin, Ruhul
,
SK Hafizul Islam
,
Arijit Karati
, and
G. P. Biswas
.
"
Design of an enhanced authentication protocol and its verification using AVISPA
." In
3rd International Conference on Recent Advances in Information Technology (RAIT)
. Dhanbad, India , 2016.
Park, Hyun-A
,
JaeHyun Park
,
JaeTark Choi
, and
DongHoon Lee
.
Toward an integrated system between cloud computing and smartcard application
In
5th International Conference on Computer Sciences and Convergence Information Technology
. Seoul, South Korea , 2010.
Pages
« първа
‹ предишна
…
346
347
348
349
350
351
352
353
354
…
следваща ›
последна »
384457 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all