Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Liao, Hung-Jen
,
Chun-Hung Richard Lin
,
Ying -Chih
, and
Kuang-Yuan Tung
.
"
Review: Intrusion detection system: A comprehensive review
."
Journal of Network and Computer Applications
(2013).
"
Kubernetes scalability and performance SLIs/SLOs
."
GitHub
(2020).
Sharkov, George
,
Yavor Papazov
,
Christina Todorova
,
Georgi Koykov
,
Martin Georgiev
, and
Georgi Zahariev
.
Cyber Threat Map for National and Sectoral Analysis
In
Computer and Communications Engineering, Workshop on Information Security 2019, 9th Balkan Conference in Informatics
., 2019.
Ojagbule, Olajide
,
Hayden Wimmer
, and
Rami J. Haddad
.
"
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
." In
IEEE, SoutheastCon 2018
. St. Petersburg, FL, USA, 2018.
Nissen, Christopher A.
,
John E. Gronager
,
Robert S. Metzger
,
Rogers Joseph O’Donnell
, and
Harvey Rishikof
.
Deliver Uncompromised: A Strategy for Supply Chain Security and Resilience
. Washington, DC: MITRE, 2019.
Schauer, Stefan
,
Martin Stamer
,
Claudia Bosse
,
Michalis Pavlidis
,
Haralambos Mouratidis
,
Sandra König
, and
Spyros Papastergiou
.
An Adaptive Supply Chain Cyber Risk Management Methodology
In
Hamburg International Conference on Logistics, Project: MITIGATE
., 2017.
Hausken, Kjell
, and
Gregory Levitin
.
"
Review of systems defense and attack models
."
International Journal of Performability Engineering
8, no. 4 (2012): 355-366.
Cooke, Nancy
,
Michael Champion
,
Prashanth Rajivan
, and
S. Jariwala
.
"
Cyber Situation Awareness and Teamwork
."
EAI Endorsed Transactions on Security and Safety
1, no. 13 (2013).
Gupta, Maanak
,
Mahmoud Abdelsalam
,
Sajad Khorsandroo
, and
Sudip Mittal
.
"
Security and Privacy in Smart Farming: Challenges and Opportunities
."
IEEE Access
8 (2020): 1-21.
McGuinness,.
, and
L. Foy
.
A Subjective Measure of SA: The Crew Awareness Rating Scale (CARS)
In
First Human Performance, Situation Awareness and Automation Conference
. Savannah, Georgia, 2000.
Onwubiko, Cyril
, and
Thomas Owens
.
"
Review of Situational Awareness for Computer Network Defense
." In
Situational Awareness in Computer Network Defense: Principles, Methods and Applications
. International Science Reference, 2011.
Popper, Karl
.
Conjectures and Refutations: The Growth of Scientific Knowledge
. London: Routledge Classics, 2009.
Ilves, Luukas
,
Timothy Evans
,
Frank Cilluffo
, and
Alec Nadeau
.
"
European Union and NATO Global Cybersecurity Challenges: A Way Forward
."
PRISM
6, no. 2 (2016).
Simola, Jussi
, and
Martti J. Lehto
.
National Cyber Threat Prevention Mechanism as a part of the E-EWS
In
International Conference on Cyber Warfare and Security
., 2020.
Simola, Jussi
.
"
Comparative Research of Cybersecurity Information Sharing Models: The Common Cyber Ecosystem of ECHO
." In
Digital Transformation, Cyber Security and Resilience (DIGILIENCE 2019)
. Sofia, 2019.
DPIA pre-assessment Report, v0.2
. ECHO, 2019.
Henriksen-Bulmer, Jane
.
Incorporating contextual integrity into privacy decision making: a risk based approach
. Bournemouth University, 2019.
Franke, Ulrik
, and
Joel Brynielsson
.
"
Cyber situational awareness - A systematic review of the literature
."
Computers & Security
46 (2014): 18-31.
Endsley, Mica
.
"
Design and Evaluation for Situation Awareness Enhancement
."
Human Factors Society Annual Meeting
32, no. 2 (1988): 97-101.
Chertov, Oleg
,
Taras Rudnyk
, and
Oleksandr Palchenko
.
Search of phony accounts on Facebook. Ukrainian case
In
International Conference on Military Communications and Information Systems (ICMCIS2018)
. Warsaw, Poland: IEEE Xplore, 2018.
Let, V. V.
, and
I.S. Skitter
.
Determination of non-standard behavior of the network by methods of statistical analysis
In
Thirteenth International Scientific and Practical Conference "Mathematical and Simu-lation Modeling of Systems MODS 2018"
. Chernihiv-Kiev-Zhukin, 2018.
Skiter, I. S.
.
Methods of forming an image of a normal computer behavior Networks
In
III International Conference "Problems of Decommissioning of Objects nuclear energy and the restoration of the environment," INUDECO
. Slavutych, 2018.
Smola, Alex
, and
S.V.N. Vishwanathan
.
Introduction to Machine Learning
. Cambridge University Press, 2008.
Wlodarczak, Peter
.
Machine Learning and its Applications
. CRC Press, 2019.
Gros, Xavier
.
NDT Data Fusion
. Great Britain: Amold, 1997.
Pages
« първа
‹ предишна
…
431
432
433
434
435
436
437
438
439
…
следваща ›
последна »
382450 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all