Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Ashraf, Imran
,
Yongwan Park
,
Soojung Hur
,
Sung Won Kim
,
Roobaea Alroobaea
,
Yousaf Bin Zikria
, and
Summera Nosheen
.
"
A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry
."
IEEE Transactions on Intelligent Transportation Systems
(2022): 1-14.
Verma, Pradeep
, and
Poornima Tyagi
.
Credit Card Fraud Transaction Classification Using Improved Class Balancing and Support Vector Machines
In
Recent Innovations in Computing: Proceedings of ICRIC 2021
. Vol. 2. Springer Nature, 2021.
Borissova, Daniela
,
Zornitsa Dimitrova
,
Naiden Naidenov
, and
Radoslav Yoshinov
.
Integrated Approach to Assessing the Progress of Digital Transformation by Using Multiple Objective and Subjective Indicators
In
Research Challenges in Information Science. RCIS 2022. Lecture Notes in Business Information Processing.
. Vol. 446. Springer, Cham, 2022.
Puchkov, Oleksandr
,
Dmytro Lande
,
Ihor Subach
,
Mykhailo Boliukh
, and
Dmytro Nahornyi
.
"
OSINT investigation to detect and prevent cyber attacks and cyber security incidents
."
Information Technology and Security
9, no. 2 (2021).
Henriksson, Johannes
.
Cyber Supply-Chain Security Challenges in the Context of Interorganizational Collaboration
In
School of Business
. Vol. Master Thesis. Örebro University, 2021.
Tarchia, Livio
,
Pietro Crescenzo
, and
Kristian Talamonti
.
"
Prevalence and predictors of mental distress among Italian Red Cross auxiliary corps: A cross-sectional evaluation after deployment in anti-COVID-19 operations
."
Military Psychology
(2022).
Ostrovsky, Aaron
.
Applying Defense-In-Depth to Defend Against Russian State-Sponsored Disinformation Campaigns
. Vol. Master of Science in Cybersecurity. Utica University, 2022.
Gramm, Joshua D.
, and
Brian A. Branagan
.
Neurowar is Here!
. Monterey, CA: Naval Postgraduate School, 2021.
Ottuh, John Arierhi
.
"
The 3Cs of Colonisation and their Impacts on African Slavery: The Nigeria’s Experience
."
Black Theology: An International Journal
20, no. 1 (2022).
Shalamanov, Velizar
,
Ivan Blagoev
, and
Iliyan Iliev
.
Level of maturity of the Cybersecurity of the infrastructure in the domain iict.bas.bg
In
IT4Sec Reports
., 2022.
Shalamanov, Velizar
,
Ivaylo Blagoev
,
Gergana Vassileva
, and
Silvia Matern
.
Infrastructure for e-Learning on ICT (digital) competencies in IICT-BAS
In
IT4Sec Reports
., 2022.
Taşer, Pelin Yıldırı
, and
Fatma Bozyigit
.
"
Machine Learning Applications for Fraud Detection in Finance Sector
." In
The Impact of Artificial Intelligence on Governance, Economics and Finance
, 121-146. Springer Nature, 2022.
Mladenova, Irena
, and
Velizar Shalamanov
.
"
Institution Building and Change Management Framework for ICT/Cyber Collaborative Network Organizations
."
Годишник на Стопанския факултет на СУ „Св. Климент Охридски“
21 (2022): 107-129.
Lukichev, P. N.
, and
A. A. Ali
.
"
Consciousness Management by Extremist Organizations With the Means of Internet Communication
."
Humanities of the South of Russia
11 (54), no. 2 (2022).
Lee, Nevada
.
UN Missions and Their Failures: How Collaboration with Military Force Complicates UN Inter ce Complicates UN Intervention in Ar ention in Areas of Conflict eas of Conflict
. Vol. Bachelor of Arts. Claremont Colleges, 2022.
Petcu, Ioana
, and
Dragoş-Cătălin Barbu
.
"
The New Challenges of Romania’s Cyber Security Policy
."
Romanian Cyber Security Journa
1, no. 4 (2022).
Setiawan, Yudy
, and
Anita Maharani
.
Unboxing Employees Perspectives on Factors Affecting Their Compliance to Organizational Information Security Policies
In
2nd International conference on smart computing and cyber security: Strategic foresight, security challenges and innovation
., 2022.
Townsend, III, Howard E.
.
An Examination of the Significance of Security Knowledge and Attitudes on Security Behavior
In
School of Business, Technology, and Health Care Administration
. Vol. Doctor of Philosophy. Capella University, 2022.
Creekmore, Jonathan
.
A Predictive Study on Acceptance of Honeypots in U.S. Cybersecurity Professionals
In
School of Business, Technology, and Health Care Administration
. Vol. Doctor of Philosophy. Capella University, 2022.
Koivisto, Jouni
,
Risto Ritala
, and
Matti Vilkko
.
"
Conceptual model for capability planning in a military context – A systems thinking approach
."
Systems Engineering
(2022): 1-18.
Ivantsov, Sergey Vyacheslav
, and
Aleksey Valeryevic Saranov
.
"
Current Challenges in Combating Trafficking in Children in the Russian Federation and CIS Member States
."
All-Russian Criminological Journal
16, no. 1 (2022): 57-72.
Sahal, Abdulkadir Mohamud
.
Human Right Violations by the Peacekeeping Forces in Somalia
In
Insitute of Graduate Studies International Law
. Vol. Master’s Thesis . Nicosia : Near East University, 2021.
Shah, Abdur Rehman
, and
Afsah Qazi
.
"
Political Survival through Religious Instrumentalism: Jamiat Ulama-e-Islam Fazlur Rehman's Resistance to Madrassah Reforms in Pakistan
." In
Politics and Religion
. Cambridge University Press, 2022.
Jano, Dorian
.
"
Albania Moving from Security Receiver to Security Provider
." In
Peace and Security in the Western Balkans: A Local Perspective
. Taylor & Francis, 2022.
Francis, Sunil
.
Sex Trafficking: The Plea of Modern Slavery
., 2022.
Pages
« първа
‹ предишна
…
504
505
506
507
508
509
510
511
512
…
следваща ›
последна »
352175 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all