Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Ottuh, John Arierhi
.
"
The 3Cs of Colonisation and their Impacts on African Slavery: The Nigeria’s Experience
."
Black Theology: An International Journal
20, no. 1 (2022).
Shalamanov, Velizar
,
Ivan Blagoev
, and
Iliyan Iliev
.
Level of maturity of the Cybersecurity of the infrastructure in the domain iict.bas.bg
In
IT4Sec Reports
., 2022.
Shalamanov, Velizar
,
Ivaylo Blagoev
,
Gergana Vassileva
, and
Silvia Matern
.
Infrastructure for e-Learning on ICT (digital) competencies in IICT-BAS
In
IT4Sec Reports
., 2022.
Taşer, Pelin Yıldırı
, and
Fatma Bozyigit
.
"
Machine Learning Applications for Fraud Detection in Finance Sector
." In
The Impact of Artificial Intelligence on Governance, Economics and Finance
, 121-146. Springer Nature, 2022.
Mladenova, Irena
, and
Velizar Shalamanov
.
"
Institution Building and Change Management Framework for ICT/Cyber Collaborative Network Organizations
."
Годишник на Стопанския факултет на СУ „Св. Климент Охридски“
21 (2022): 107-129.
Lukichev, P. N.
, and
A. A. Ali
.
"
Consciousness Management by Extremist Organizations With the Means of Internet Communication
."
Humanities of the South of Russia
11 (54), no. 2 (2022).
Lee, Nevada
.
UN Missions and Their Failures: How Collaboration with Military Force Complicates UN Inter ce Complicates UN Intervention in Ar ention in Areas of Conflict eas of Conflict
. Vol. Bachelor of Arts. Claremont Colleges, 2022.
Petcu, Ioana
, and
Dragoş-Cătălin Barbu
.
"
The New Challenges of Romania’s Cyber Security Policy
."
Romanian Cyber Security Journa
1, no. 4 (2022).
Setiawan, Yudy
, and
Anita Maharani
.
Unboxing Employees Perspectives on Factors Affecting Their Compliance to Organizational Information Security Policies
In
2nd International conference on smart computing and cyber security: Strategic foresight, security challenges and innovation
., 2022.
Townsend, III, Howard E.
.
An Examination of the Significance of Security Knowledge and Attitudes on Security Behavior
In
School of Business, Technology, and Health Care Administration
. Vol. Doctor of Philosophy. Capella University, 2022.
Creekmore, Jonathan
.
A Predictive Study on Acceptance of Honeypots in U.S. Cybersecurity Professionals
In
School of Business, Technology, and Health Care Administration
. Vol. Doctor of Philosophy. Capella University, 2022.
Koivisto, Jouni
,
Risto Ritala
, and
Matti Vilkko
.
"
Conceptual model for capability planning in a military context – A systems thinking approach
."
Systems Engineering
(2022): 1-18.
Ivantsov, Sergey Vyacheslav
, and
Aleksey Valeryevic Saranov
.
"
Current Challenges in Combating Trafficking in Children in the Russian Federation and CIS Member States
."
All-Russian Criminological Journal
16, no. 1 (2022): 57-72.
Sahal, Abdulkadir Mohamud
.
Human Right Violations by the Peacekeeping Forces in Somalia
In
Insitute of Graduate Studies International Law
. Vol. Master’s Thesis . Nicosia : Near East University, 2021.
Shah, Abdur Rehman
, and
Afsah Qazi
.
"
Political Survival through Religious Instrumentalism: Jamiat Ulama-e-Islam Fazlur Rehman's Resistance to Madrassah Reforms in Pakistan
." In
Politics and Religion
. Cambridge University Press, 2022.
Jano, Dorian
.
"
Albania Moving from Security Receiver to Security Provider
." In
Peace and Security in the Western Balkans: A Local Perspective
. Taylor & Francis, 2022.
Francis, Sunil
.
Sex Trafficking: The Plea of Modern Slavery
., 2022.
Redmond, Rachel
.
Social Media and Strategic Culture: An Analysis of Russian Information Warfare in the Twenty-First Century
In
Department of Political Science, Concentration TransAtlantic Studies
. Vol. Master of Arts. Chapel Hill: University of North Carolina, 2022.
Hall, Rosalie Arcala
.
"
Pandemic and Beyond: Domestic Call-Out Operations of the Philippine Military
." In
Military Operation and Engagement in the Domestic Jurisdiction
, 334-371., 2022.
Ludvigsen, Kaspar Rosager
, and
Shishir Nagaraja
.
"
The Opportunity to Regulate Cybersecurity in the EU (and the World): Recommendations for the Cybersecurity Resilience Act
."
arXiv preprint arXiv:2205.13196
(2022).
Fitriyani, Zenita Afifah
,
Yuyu Jahratu No Santy
,
Eka Indah Nur Laili
, and
Oktaviani Permatasari
.
"
Is a Food Security Program a Solution in Family Economic Resilience?
."
Mega Aktiva: Jurnal Ekonomi dan Manajemen
11, no. 1 (2022).
Schwartz, Sebastian
,
Laura Guntrum
, and
Christian Reuter
.
"
Vision or Threat -Awareness for Dual-Use in the Development of Autonomous Driving
."
IEEE Transactions on Technology and Society
(2022).
Stucki, Max
.
Refleksiivinen Kontrolli: Systemaattinen Kirjallisuuskatsaus
In
Informaatioteknologian Tiedekunta
. Jyväskylän Yliopisto, 2022.
Aaltola, Kirsi
,
Harri Ruoslahti
, and
Jarmo Heinonen
.
Desired Cybersecurity Skills and Skills Acquisition Methods in the Organizations
In
21st European Conference on Cyber Warfare and Security
., 2022.
Hytönen, Eveliina
,
Amir Trent
, and
Harri Ruoslahti
.
"
Societal Impacts of Cyber Security in Academic Literature: Systematic Literature Review
." In
21st European Conference on Cyber Warfare and Security
., 2022.
Pages
« първа
‹ предишна
…
504
505
506
507
508
509
510
511
512
…
следваща ›
последна »
381072 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all