Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
BlueVoyant
.
Managing Cyber Risk Across the Extended Vendor Ecosystem
., 2020.
Spadafora, Anthony
.
Energy Giant EDP Hit with RagnarLocker Ransomware
. UK edition. techradar.pro, 2020.
Malwarebytes Threat Intelligence Team
.
Honda and Enel Impacted by Cyber Attack Suspected to be Ransomware
., 2020.
Petcu, Alina Georgiana
.
Netwalker Ransomware Explained: What You Need to Know
., 2020.
Hassanzadeh, Amin
,
Amin Rasekh
,
Stefano Galelli
,
Mohsen Aghashahi
,
Riccardo Taormina
,
Avi Ostfeld
, and
Katherine M. Banks
.
"
A Review of Cybersecurity Incidents in the Water Sector
."
Journal of Environmental Engineering
146, no. 5 (2020): 03120003.
Kardon, Steve
.
"
Florida Water Treatment Plant Hit with Cyber Attack
."
Industrial Defender
(2021).
Willemsen, Bert
, and
Menno Cadee
.
"
Extending the Airport Boundary: Connecting Physical Security and Cybersecurity
."
Journal of Airport Management
12, no. 3 (2018): 236-247.
Johnson, Chris W.
.
"
Preparing for Cyber-attacks on Air Traffic Management Infrastructures: Cyber-safety Scenario Generation
." In
7th IET International Conference on Sys¬tem Safety, incorporating the Cyber Security Conference
. Edinburgh, UK, 2012.
Newman, Lily Hay
.
Russia’s FireEye Hack Is a Statement—but Not a Catastrophe
. Wired, 2020.
Kovacs, Eduard
.
SolarWinds Says 18,000 Customers May Have Used Compromised Orion Product
. SecurityWeek, 2020.
Tidy, Gordon Coreraand
.
US Treasury and Commerce Department Targeted in Cyber-attack
. BBC News, 2020.
Sattler, Jason
.
"
Significant Attacks on Microsoft Exchange ProxyLogon Detected
."
F-Secure
(2021).
Fruhlinger, Josh
.
Equifax Data Breach FAQ: What Happened, Who Was Affected, What Was the Impact?
. CSO, 2020.
Sonatype
.
2020 DevSecOps Community Survey
., 2021.
Sonatype
.
2020 State of the Software Supply Chain Report
., 2020.
UK Cabinet Office & Detica
.
The Cost of Cyber Crime
., 2011.
Ponemon Institute & Accenture Security
.
The Cost of Cybercrime, 2019
., 2019.
Department for Digital, Culture, Media & Sport
.
Cyber Security Breaches Survey 2020
., 2020.
Sobb, Theresa
,
Benjamin Turnbull
, and
Nour Moustafa
.
"
upply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions
."
Electronics
9, no. 11 (2020): 1864.
Eggers, Shannon
.
"
A Novel Approach for Analyzing the Nuclear Supply Chain Cyber-Attack Surface
."
Nuclear Engineering and Technology
53, no. 3 (2021): 879-887.
Yeboah-Ofori, Abel
, and
Shareeful Islam
.
"
Cyber Security Threat Modeling for Supply Chain Organizational Environments
."
Future Internet
11, no. 3 (2019): 63.
Polatidis, Nikolaos
,
Michalis Pavlidis
, and
Haralambos Mouratidis
.
"
Cyber-attack Path Discovery in a Dynamic Supply Chain Maritime Risk Management System
."
Computer Standards & Interfaces
56 (2018): 74-82.
Security Program Requirements for IACS Service Providers
., 2021.
ENISA
.
Guidelines for Securing the Internet of Things
., 2020.
Whyte, William Foote
.
Learning from the Field: A Guide from Experience
. Beverly Hills, CA: Sage Publications, 1984.
Pages
« първа
‹ предишна
…
486
487
488
489
490
491
492
493
494
…
следваща ›
последна »
347871 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all