Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Cybersecurity in the shipping industry
In
Capital Link Cyprus Shipping Forum, Deloitte
., 2019.
Baskar, Kala
, and
Mahesh Balakris
.
"
Cyber Preparedness in Maritime Industry
."
nternational Journal of Scientific and Technical Advancements
5, no. 2 (2019): 19-28.
Hyra, Bartlomiej
.
Analyzing the Attack Surface of Ships
In
DTU Compute Department of Applied Mathematics and Computer Science
. Kongens Lyngby: Technical University of Denmark, 2019.
Abraham, Subil
, and
Suku Nair
.
"
A Predictive framework for cybersecurity analytics using attack graphs
."
International Journal of Computer Networks & Communications (IJCNC)
7, no. 1 (2015).
8 Maritime Systems That Ensures Ship Safety and Security
. Marin Insight, 2020.
Melnick, Jeff
.
Top 10 Most Common Types of Cyber Attacks
. Netwrix Blog, 2020.
The guidelines on cybersecurity onboard ships
In
version 3
. BIMCO, 2018.
How Big a Problem is Maritime Cyber Security
. Videotel, 2019.
Yin, Lihua
,
Yanwei Sun
,
Zhen Wang
,
Yunchuan Guo
,
Fenghua Li
, and
BinxingFang
.
"
Security Measurement for Unknown Threats Based on Attack Preferences
."
Hindawi Security and Communication Networks
(2018).
Kim, Dohoon
.
"
Decision-Making Method for Estimating Malware Risk Index
."
Applied Sciences
9, no. 22 (2019): 4943.
Shahzad, Malik
,
Kaleem Awan
, and
Mohammed A. Al Ghamdi
.
"
Understanding the Vulnerabilities in Digital Components of an Integrated Bridge System (IBS)
."
Journal of Marine Science and Engineering
7, no. 10 (2019).
Shahzad, Malik
,
Kaleem Awan
,
Pete Burnap
, and
Omer Rana
.
"
Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk
."
Elsevier, Computers & Security
57 (2016): 31-46.
Callegari, Christian
,
Stefano Giordano
, and
Michele Pagano
.
"
An information-theoretic method for the detection of anomalies in network traffic
."
Elsevier, Computers & Security
70 (2017): 351-365.
Palikaris, Athanasios
, and
Athanasios K. Mavraeidopoulos
.
"
Electronic Navigational Charts: International Standards and Map Projections
."
Journal of Marine Science and Engineering
8 (2020): 248.
Balduzzi, Marco
,
Kyle Wilhoit
, and
Alessandro Pasta
.
A Security Evaluation of AIS
. TrendMicro, 2016.
Munro, Ken
.
Hacking, tracking, stealing and sinking ships
. Pen Test Partners, Blog: Maritime Cyber Security, 2018.
Si, Katherine
.
Cosco Shipping Port sells port assets to SIPG
. Seatrade Maritime, 2019.
Busch, Gary
.
America’s failed seaports – Trump’s ‘America First’ policy isn’t the only barrier to free trade
. Lima Charlie News, 2020.
Svilicic, Boris
,
David Brčić
,
Srdjan ŽuŁkin
, and
David Kalebic
.
"
Raising Awareness on Cyber Security of ECDIS
."
Transnav, the International Journal on Marine Navigation and Safety of Sea Transportation
13, no. 1 (2019).
Balduzzi, Marco
,
Alessandro Pasta
, and
Kyle Wilhoit
.
A security evaluation of AIS automated identification system
In
ACSAC '14, 30th Annual Computer Security Applications Conference
., 2014.
Dalto, Jeffrey
.
The Three Phases of Risk Assessment: Risk Management Basics
In
Vector solutions, Convergence training
., 2019.
von Ogden, Jacqueline
.
3 Ways to Mitigate the Human Factors of Cyber Security
. CIMCOR, 2017.
Bowen, Brian M.
,
Ramaswamy Devarajan
, and
Salvatore Stolfo
.
"
Measuring the Human Factor of Cyber Security
." In
EEE Homeland Security Technology Conference
., 2011.
National Institute of Standards and Technology
.
Security and Privacy Controls for Federal Information Systems and Organizations
In
Special Publication
., 2013.
ASIS SPC.1-2009 - Organizational Resilience: Security, Preparedness, And Continuity Management Systems - Requirements with Guidance for Use
. Webstore.ANSI.org, 2009.
Pages
« първа
‹ предишна
…
420
421
422
423
424
425
426
427
428
…
следваща ›
последна »
347973 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all