Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Hall, Rosalie Arcala
.
"
Pandemic and Beyond: Domestic Call-Out Operations of the Philippine Military
." In
Military Operation and Engagement in the Domestic Jurisdiction
, 334-371., 2022.
Ludvigsen, Kaspar Rosager
, and
Shishir Nagaraja
.
"
The Opportunity to Regulate Cybersecurity in the EU (and the World): Recommendations for the Cybersecurity Resilience Act
."
arXiv preprint arXiv:2205.13196
(2022).
Fitriyani, Zenita Afifah
,
Yuyu Jahratu No Santy
,
Eka Indah Nur Laili
, and
Oktaviani Permatasari
.
"
Is a Food Security Program a Solution in Family Economic Resilience?
."
Mega Aktiva: Jurnal Ekonomi dan Manajemen
11, no. 1 (2022).
Schwartz, Sebastian
,
Laura Guntrum
, and
Christian Reuter
.
"
Vision or Threat -Awareness for Dual-Use in the Development of Autonomous Driving
."
IEEE Transactions on Technology and Society
(2022).
Stucki, Max
.
Refleksiivinen Kontrolli: Systemaattinen Kirjallisuuskatsaus
In
Informaatioteknologian Tiedekunta
. Jyväskylän Yliopisto, 2022.
Aaltola, Kirsi
,
Harri Ruoslahti
, and
Jarmo Heinonen
.
Desired Cybersecurity Skills and Skills Acquisition Methods in the Organizations
In
21st European Conference on Cyber Warfare and Security
., 2022.
Hytönen, Eveliina
,
Amir Trent
, and
Harri Ruoslahti
.
"
Societal Impacts of Cyber Security in Academic Literature: Systematic Literature Review
." In
21st European Conference on Cyber Warfare and Security
., 2022.
Nakayama, Bryan James
.
"
Information vs the cyberspace domain
."
Journal of Cyber Policy
(2022).
Raikes, Jonathan
.
Disaster risk reduction and the Sustainable Development Goals: Pre-disaster governance for integrated management in Canada and Australia
. Vol. Doctor of Philosophy. Queensland: University of the Sunshine Coast, 2022.
Nikolov, Petar
,
Desislava Hristova
, and
Vanya Stoycheva
.
"
Modeling of flood regulation for ecosystem accounting: a case study of Ogosta river basin
."
Journal of the Bulgarian Geographical Society
46 (2022): 3-10.
Schumann, Felix
, and
Michael Döring
.
The impact of digital transformation on Top Management Teams: A systematic literature review and analysis on the role delineation of the Chief Digital Officer and the Chief Information Officer
In
PACIS 2022
. Taipei-Sydney, 2022.
K. Ludvigsen, Rosager
, and
S. Nagaraja
.
"
The opportunity to regulate cybersecurity in the EU (and the world): recommendations for the Cybersecurity Resilience Act
."
arXiv.org
(2022).
Mässeli, Eemeli
.
Enäjän Informaatiopsykologinen Sodankäynti – Suomen Torjunta- ja Varautumistoimenpiteiden Määrittely
In
Informaatioteknologian Tiedekunta
. Vol. Pro Gradu-tutkielma . Jyväskylän Yliopisto, 2022.
Liua, Ben
,
Ratnasingham Tharmarasaa
,
Mihai Floreab
,
Rahim Jassemic
, and
Thia Kirubarajan
.
"
Diver Tracking in Unknown Structured Clutter Background using a Force-based GM-PHD Filter
."
Signal Processing
200 (2022).
Lazarov, Andon D.
, and
Petia Petrova
.
"
Modelling Activity of a Malicious User in Computer Networks
."
Cybernetics and Information Technologies
22, no. 2 (2022).
Jiang, Tianjiao
.
"
The Shift of China’s Strategic Thinking on Cyberwarfare Since the 1990s
."
Journal of Chinese Political Science
(2022).
Baraković, Sabina
, and
Jasmina Baraković Husić
.
"
Cyber hygiene knowledge, awareness, and behavioral practices of university students
."
Information Security Journal: A Global Perspective
(2022).
Amulya, Alamanda
,
Ragu Leela Venk Sai
,
Yaga Srivalli
,
Kunche Kavya
, and
Kalidindi Jyothika
.
"
A Novel Approach for Analysing and Predicting the Online Money Transactions Using Machine Learning Auto Encoders
."
Journal of Engineering Sciences
13 (2022).
Notarmuzi, Daniele
.
Information Diffusion in Online Social Media
In
n Luddy School of Informatics, Computing, and Engineering
. Vol. Doctor of Philosophy. Indiana University, 2022.
Alanazi, Marfua
,
Mark Freeman
, and
Holly Tootell
.
"
Exploring the factors that influence the cybersecurity behaviors of young adults Author links open overlay panel
."
Computers in Human Behavior
136 (2022).
Moturi, Ievgeniia
,
Livia Dzupinova
, and
Michael Christensen
.
Incident Information Sharing in the Danish Critical Infrastructure: Proposal of a Conceptual Centralised Framework
In
Electronics systems
. Vol. Master Thesis. Aalborg University, 2022.
Hall, Lynne
,
Samiullah Paracha
,
Gill Hagan-Green
,
Catrina Ure
, and
Phil Jackman
.
Cyber Eyes Wide Open: Creative Collaboration between Artists, Academics & Cyber Security Practitioners
In
35th International BCS Human-Computer Interaction Conference
. Keele: Keele University, 2022.
Caison, Shawn
.
The Relationship between Consumer Awareness of Information Security, Age, and Internet of Things Product Acquisitions
In
School of Business, Technology, and Health Care Administration
. Vol. Doctor of Philosophy. Capella University, 2022.
Krisnata, Rachmanu
,
Agus H. S. Reksoprodjo
, and
Surryanto Djoko Waluyo
.
"
Strategi Pengembangan Kapabilitas Siber Pertahanan Untuk Menghadapi Peperangan Siber (Studi Kasus Pada Pushansiber Kemhan Ri 2020-2021)
."
NUSANTARA : Jurnal Ilmu Pengetahuan Sosial
9, no. 6 (2022).
Alatalo, Janne
,
Tuomo Sipola
, and
Tero Kokkonen
.
Detecting One-Pixel Attacks Using Variational Autoencoders
., 2022.
Pages
« първа
‹ предишна
…
505
506
507
508
509
510
511
512
513
…
следваща ›
последна »
347837 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all