Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Gerber, Nina
,
Paul Gerber
, and
Melanie Volkamer
.
"
Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior
."
Computers and Security
77 (2018).
NEN-EN-ISO/IEC 27002: Information technology - Security techniques – Code of practice for information security controls
., 2017.
Parsons, Kathryn
,
Agata McCormac
,
Malcolm Pattinson
,
Marcus Butavicius
, and
Cate Jerram
.
An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations
In
Proceedings of theEuropean Information Security Multi-Conference (EISMC 2013)
., 2013.
Sue, Valerie
, and
Lois Ritter
.
Conducting Online Surveys
. Thousand Oaks, CA: Sage Publications, 2012.
Dwyer, Evelyn
.
Attitude Scale Construction: A Review of the literature
. ERIC Institute of Education Sciences, 1993.
Mayer, Peter
,
Alexandra Kun
, and
Melanie Volkamer
.
Reliable Behavioural Factors in the Information Security Context
In
ACM International Conference Proceeding Series
. Vol. Part F1305., 2017.
Lohrmann, Dan
.
"
Cyber Range: Who, What, When, Where, How and Why?
"
Government Technology Magazine
31, no. 2 (2018): 529-551.
Mirkovic, Jelena
,
Terry V. Benzel
,
Ted Faber
,
Robert Braden
,
John Wroclawski
, and
Stephen Schwab
.
The DETER Project
In
The DETER Project," in IEEE International Conference on Technologies for Homeland Security (HST ’10)
., 2010.
Ferguson, Bernard
,
Anne Tall
, and
Denise Olsen
.
National cyber range overview
In
IEEE Military Communications Conference, Baltimore, MD, USA,
., 2010.
The Michigan Cyber Range
. MCR, 2020.
Lee, Rossey
.
"
SimSpace Cyber Range
." In
Panel: Cyber Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research
. Boston, United States, 2015.
Weiss, Richard
,
Franklyn Turbak
,
Jens Mache
, and
Michael Locasto
.
"
Cybersecurity Education and Assessment in EDURange
."
IEEE Security & Privacy
15, no. 3 (2017): 90-95.
Estonian Ministry of Defence
.
Estonian Defence Force’s Cyber Range
., 2014.
Prior, Tim
, and
Florian Roth
.
CSS Study: Learning from Disaster Events and Exercises in Civil protection Organizations
In
Risk and Resilience Reports
. Zurich: Center for Security Studies, 2016.
Hoffman, Lance
,
Timothy Rosenberg
,
Ronald Dodge
, and
Daniel Ragsdale
.
"
Exploring a national cybersecurity exercise for universities
."
IEEE Security and privacy
3, no. 5 (2005): 27-33.
Andreev, Evgeni
,
Mariya Nikolova
,
Veselka Radeva
, and
Georgi Bochev
.
Creating Moon Port and Spaceship Simulations in A Virtual Environment
In
44th International Conference on Applications of Mathematics in Engineering and Economics AIP
. Vol. 2048., 2018.
Andreev, Evgeni
,
Veselka Radeva
, and
Mariya Nikolova
.
Innovative Biomonitoring Systems in The Aerospace Industry
In
CEMA’19 conference
. Sofia, 2019.
Clarke, Justin
.
SQL Injection Attacks and Defense
. USA: Syngress, 2012.
Conroy, M.
.
Design and Development with Very Distributed Teams
., 2018.
Dietzler, Dave
.
"
Making it on the Moon: Bootstrapping Lunar Industry
."
The NSS Space Settlement Journal
1 (2016).
Isbell, Douglas
, and
David Morse
.
Latest lunar prospector findings indicate larger amounts of polar water ice
In
LRC Publications
., 2005.
Dunkin, Sarah
, and
David Heather
.
New views of the Moon
. Physics Web, 2005.
Falcone, Alberto
,
Alfredo Garro
,
S.J.E. Taylor
,
A. Anagnostou
,
N.R. Chaudhry
, and
O. Salah
.
"
Experiences in simplifying distributed simulation: The HLA development kit frame-work
."
Journal of Simulation
11 (2017): 208-227.
Garro, Alfredo
, and
Alberto Falcone
.
"
An introduction to the SEE HLA Starter Kit
." In
Spring Simulation Multi-Conference (SpringSim'16)
., 2016.
Globus, Al
, and
Joe Strout
.
"
Orbital Space Settlement Radiation Shielding
."
NSS Space Settlement Journal
2 (2017).
Pages
« първа
‹ предишна
…
438
439
440
441
442
443
444
445
446
…
следваща ›
последна »
382312 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all