Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Falcone, Alberto
,
Alfredo Garro
,
S.J.E. Taylor
,
A. Anagnostou
,
N.R. Chaudhry
, and
O. Salah
.
"
Experiences in simplifying distributed simulation: The HLA development kit frame-work
."
Journal of Simulation
11 (2017): 208-227.
Garro, Alfredo
, and
Alberto Falcone
.
"
An introduction to the SEE HLA Starter Kit
." In
Spring Simulation Multi-Conference (SpringSim'16)
., 2016.
Globus, Al
, and
Joe Strout
.
"
Orbital Space Settlement Radiation Shielding
."
NSS Space Settlement Journal
2 (2017).
Gorecki, Simon
,
Grégory Zacharewicz
, and
Nicolas Perry
.
"
Using High Level Architecture in the SEE Project for industrial context
." In
Service Orientation in Holonic and Multi-Agent Manufacturing, Studies in Computational Intelligence
. Vol. 762. Cham: Springer, 2018.
Gupta, Rajneesh
.
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
. Packt, 2018.
Lefterova, Мilena
.
Verification and Validation Strategy for Precisely Drag Estimation of ERCOFTAC Test Body
In
Black Sea’2010
. Varna: University publishing house, Technical University, 2010.
Sivkov, Jordan
.
Information system for collection, processing and presentation of data from sensor nodes
In
16th Conference on Electrical Machines, Drives and Power Systems, ELMA 2019
. Varna, 2019.
Lefterova, Мilena
.
Mathematical models of ship maneuverability
. University publishing house, Technical University of Varna, 2020.
Wieczorek, Mark
,
Bradley Jolliff
,
Amir Khan
,
Matthew Pritchard
,
Benjamin Weiss
,
James Williams
,
Lon Hood
,
Kevin Righter
,
Clive Neal
,
Ray Hawke
et al.
"
The constitution and structure of the lunar interior
."
Reviews in Mineralogy and Geochemistry
60, no. 1 (2006): 221-364.
Tsonev, Yuliyan
, and
Milen Sotirov
.
Gamification in Education as a Way for Improving Student Knowledge and Productivity
In
11th International Scientific Conference "Digital Economy and Blockchain Technologies"
. Varna, 2018.
Cohen, Marc
.
"
Mobile Lunar and Planetary Bases
." In
Space 2003 Conference
. San Diego, CA, 2003.
Cohen, Marc
.
Mobile Lunar Base Concepts
In
AIP Conference Proceedings
. Vol. 699., 2004.
Pitch pRTI™
., 2020.
The HLA tutorial
., 2020.
SEE 2018
. Sofia, Bulgaria, 2018.
SEE 2020, Final Event Video
., 2020.
SEE Web site
., 2020.
Wiklundh, Kia C.
.
nderstanding the IoT technology LoRa and its interference vulnerability
In
2019 International Symposium on Electromagnetic Compatibility - EMC EUROPE
., 2019.
Dimitrov, Georgi
,
Galina Panayotova
,
Eugenia Kovatcheva
,
Daniela Borissova
, and
Pavel Petrov
.
"
One Approach for Identification of Brain Signals for Smart Devices Control
."
Journal of Software
13, no. 7 (2018): 407-413.
Aras, Emekcan
,
Gowri Sankar Ramachandran
,
Piers Lawrence
, and
Danny Hughes
.
Exploring the Security Vulnerabilities of LoRa
In
2017 3rd IEEE International Conference on Cybernetics (CYBCONF)
. Exeter, UK, 2017.
Xu, Weitao
,
Sanjay Jha
, and
Wen Hu
.
"
LoRa-Key: Secure Key Generation System for LoRa-Based Network
."
IEEE Internet of Things Journal
6, no. 4 (2019): 6404-6416.
Xing, Jinyu
,
Lu Hou
,
Kuan Zhang
, and
Kan Zheng
.
An Improved Secure Key Management Scheme for LoRa System
In
2019 IEEE 19th International Conference on Communication Technology (ICCT)
. Xi'an, China, 2019.
Manoharan, Anto Merline
, and
Vimalathithan Rathinasabapathy
.
"
Secured Communication for Remote Bio-Medical Monitoring System Using LoRa
."
Sensor Letters
17, no. 11 (2019): 888-897.
Tolubko, Vladimir
,
O. Kurchenko
, and
Alina Shevchenko
.
"
Stabilization of the functional stability of the information system by controlling the dynamics of security profiles
."
Modern Information Security
3 (2018): 51-57.
Класифікація автоматизованих систем і стандартні функціональні профілі захищеності оброблюваної інформації від несанкціонованого доступу
. Департамент спеціальних телекомунікаційних систем та захисту інформації СБ України, 1999.
Pages
« първа
‹ предишна
…
439
440
441
442
443
444
445
446
447
…
следваща ›
последна »
347941 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all