Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Gorecki, Simon
,
Grégory Zacharewicz
, and
Nicolas Perry
.
"
Using High Level Architecture in the SEE Project for industrial context
." In
Service Orientation in Holonic and Multi-Agent Manufacturing, Studies in Computational Intelligence
. Vol. 762. Cham: Springer, 2018.
Gupta, Rajneesh
.
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
. Packt, 2018.
Lefterova, Мilena
.
Verification and Validation Strategy for Precisely Drag Estimation of ERCOFTAC Test Body
In
Black Sea’2010
. Varna: University publishing house, Technical University, 2010.
Sivkov, Jordan
.
Information system for collection, processing and presentation of data from sensor nodes
In
16th Conference on Electrical Machines, Drives and Power Systems, ELMA 2019
. Varna, 2019.
Lefterova, Мilena
.
Mathematical models of ship maneuverability
. University publishing house, Technical University of Varna, 2020.
Wieczorek, Mark
,
Bradley Jolliff
,
Amir Khan
,
Matthew Pritchard
,
Benjamin Weiss
,
James Williams
,
Lon Hood
,
Kevin Righter
,
Clive Neal
,
Ray Hawke
et al.
"
The constitution and structure of the lunar interior
."
Reviews in Mineralogy and Geochemistry
60, no. 1 (2006): 221-364.
Tsonev, Yuliyan
, and
Milen Sotirov
.
Gamification in Education as a Way for Improving Student Knowledge and Productivity
In
11th International Scientific Conference "Digital Economy and Blockchain Technologies"
. Varna, 2018.
Cohen, Marc
.
"
Mobile Lunar and Planetary Bases
." In
Space 2003 Conference
. San Diego, CA, 2003.
Cohen, Marc
.
Mobile Lunar Base Concepts
In
AIP Conference Proceedings
. Vol. 699., 2004.
Pitch pRTI™
., 2020.
The HLA tutorial
., 2020.
SEE 2018
. Sofia, Bulgaria, 2018.
SEE 2020, Final Event Video
., 2020.
SEE Web site
., 2020.
Wiklundh, Kia C.
.
nderstanding the IoT technology LoRa and its interference vulnerability
In
2019 International Symposium on Electromagnetic Compatibility - EMC EUROPE
., 2019.
Dimitrov, Georgi
,
Galina Panayotova
,
Eugenia Kovatcheva
,
Daniela Borissova
, and
Pavel Petrov
.
"
One Approach for Identification of Brain Signals for Smart Devices Control
."
Journal of Software
13, no. 7 (2018): 407-413.
Aras, Emekcan
,
Gowri Sankar Ramachandran
,
Piers Lawrence
, and
Danny Hughes
.
Exploring the Security Vulnerabilities of LoRa
In
2017 3rd IEEE International Conference on Cybernetics (CYBCONF)
. Exeter, UK, 2017.
Xu, Weitao
,
Sanjay Jha
, and
Wen Hu
.
"
LoRa-Key: Secure Key Generation System for LoRa-Based Network
."
IEEE Internet of Things Journal
6, no. 4 (2019): 6404-6416.
Xing, Jinyu
,
Lu Hou
,
Kuan Zhang
, and
Kan Zheng
.
An Improved Secure Key Management Scheme for LoRa System
In
2019 IEEE 19th International Conference on Communication Technology (ICCT)
. Xi'an, China, 2019.
Manoharan, Anto Merline
, and
Vimalathithan Rathinasabapathy
.
"
Secured Communication for Remote Bio-Medical Monitoring System Using LoRa
."
Sensor Letters
17, no. 11 (2019): 888-897.
Tolubko, Vladimir
,
O. Kurchenko
, and
Alina Shevchenko
.
"
Stabilization of the functional stability of the information system by controlling the dynamics of security profiles
."
Modern Information Security
3 (2018): 51-57.
Класифікація автоматизованих систем і стандартні функціональні профілі захищеності оброблюваної інформації від несанкціонованого доступу
. Департамент спеціальних телекомунікаційних систем та захисту інформації СБ України, 1999.
Критерії оцінки захищеності інформації в комп’ютерних системах від несанкціонованого доступу
. Департамент спеціальних телекомунікаційних систем та захисту інформації СБ України, 1999.
AL-Dhief, Fahad
,
Naseer Sabri
,
Abdul Latiff
,
Nik Noordini Malik
,
Musatafa Albader
,
Mazin Mohammed
,
Rami AL-Haddad
,
Yasir Salman
,
Mohd Ghani
, and
Omar Obaid
.
"
Performance Comparison between TCP and UDP Protocols in Different Simulation Scenarios
."
International Journal of Engineering & Technology
7, no. 4.36 (2018): 172-176.
Nor, hahrudin Awang
,
Raaid Alubady
, and
Wisam Abduladeem Kamil
.
"
Simulated performance of TCP, SCTP, DCCP and UDP protocols over 4G network
."
Procedia Computer Science
111 (2017): 2-7.
Pages
« първа
‹ предишна
…
439
440
441
442
443
444
445
446
447
…
следваща ›
последна »
382302 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all