Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Penchev, Georgi
, and
Velizar Shalamanov
.
"
Governance Consulting Services and Tools: Governance Model Design for Collaborative Networked Organisations in the Cyber Domain
."
Information & Security: An International Journal
53, no. 1 (2022): 147-160.
Frisk, Ilona
,
Ilkka Tikanmäki
, and
Harri Ruoslahti
.
"
Piloting the ECHO e-Skills and Training Toolkit
."
Information & Security: An International Journal
53, no. 2 (2022): 163-175.
Varbanov, Pavel
.
"
Perspectives in the Design of a Modern Cybersecurity Training Programme: The ECHO Approach
."
Information & Security: An International Journal
53, no. 2 (2022): 177-190.
Polimenov, Ventsislav
,
Katya Dimitrova
,
Irena Mladenova
, and
Kamen Iliev
.
"
The Hackathons as a First Step to Build Digital Competences
."
Information & Security: An International Journal
53, no. 2 (2022): 191-204.
Mednikarov, Boyan
,
Yuliyan Tsonev
,
Borislav Nikolov
, and
Andon Lazarov
.
"
Cyber Hygiene Issues in the Naval Security Environment
."
Information & Security: An International Journal
53, no. 2 (2022): 205-218.
Ronchi, Alfredo M.
.
"
Human Factor, Resilience, and Cyber/Hybrid Influence
."
Information & Security: An International Journal
53, no. 2 (2022): 221-239.
Mygal, Valeriy
,
Galyna Mygal
, and
Stanislav Mygal
.
"
Problems of Safety in the Evolving Industrial Environment and the Development of Information Technology: The Human Factor
."
Information & Security: An International Journal
53, no. 2 (2022): 240-252.
Tremori, Alberto
,
Sasha B. Godfrey
,
Luca Berretta
,
Arnau Carrera Viñas
,
Pavlina Nikolova
, and
Iliyan Hutov
.
"
Simulation-Based Training with Gamified Components for Augmented Border Protection
."
Information & Security: An International Journal
53, no. 2 (2022): 255-272.
de la Vallée, Paloma
,
Georgios Iosifidis
, and
Wim Mees
.
"
Cyber Red Teaming: Overview of Sly, an Orchestration Tool
."
Information & Security: An International Journal
53, no. 2 (2022): 273-286.
Sharkov, George
,
Christina Todorova
,
Georgi Koykov
, and
Ivan Nikolov
.
"
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience
."
Information & Security: An International Journal
53, no. 2 (2022): 287-302.
Root, Hilton L.
.
"
How Networks of Social Cooperation Scale into Civilizations
."
Connections: The Quarterly Journal
20, no. 3 (2021): 5-29.
Shalamanov, Velizad
, and
Borislav Bankov
.
"
NATO Cyber Defence Policy and Hybrid Threats: The Way to Enhance Our Resilience
." In
NATO Science for Peace and Security Series - D: Information and Communication Security
. Vol. Volume 61: Building Cyber Resilience against Hybrid Threats., 2021.
McCants, Nicholas
.
The Resource Allocation Process and the Effects on Cybersecurity Culture
In
. Vol. Doctor of Information Technology. Capella University.
Tosun, Petek
.
"
Transforming Universities for a More Competent Society: Digitalization and Higher Education
." In
Multidisciplinary Perspectives Towards Building a Digitally Competent Society
, 230-247., 2022.
Kaushik, Keshav
.
"
Blockchain Enabled Artificial Intelligence for Cybersecurity Systems
." In
Big Data Analytics and Computational Intelligence for Cybersecurity
, 165-179. Cham: Springer, 2022.
Karagiannis, Stylianos
.
Systematic Design, Deployment and Evaluation of Gamified Cybersecurity Learning Environments
In
Department of Informatics
. Corfu, Greece: Ionian University, 2022.
Scott, Nicholas V.
.
A Theoretical Formulism for Evidential Reasoning and Logic Based Bias Reduction in Geo-Intelligence Processing
In
4 th International Conference on Statistics: Theory and Applications (ICSTA'22)
. Prague, Czech Republic, 2022.
Giannino, Marco
.
Money Laundering and Terrorist Financing through Cryptocurrency
. Vol. Master of Science in Financial Crimes and Compliance Management. Utica University, 2022.
Dowse, Andrew
, and
Sascha Dov Bachmann
.
"
Information warfare: methods to counter disinformation
."
Defense & Security Analysis
(2022).
Courtain, Sylvain
.
Essays on network data analysis through the bag-of-paths framework
In
Louvain Research Institute in Management and Organizations Louvain School of Management
. Vol. Doctor of Philosophy in Economics and Management Sciences. Université catholique de Louvain, 2022.
Barahona, Carolina del Rocio
.
Martens Clause: application in the context of Cyberwar
In
Facultad de Jurisprudencia
. Pontificia Universidad Católica del Ecuador, 2022.
K¨onig, Philip
,
Fabian Obermann
,
Kevin Mallinger
, and
Alexander Schatten
.
Root Cause Analysis of Software Aging in Critical Information Infrastructure
., 2022.
Lewandowsky, Stephan
, and
John Cook
.
The Conspiracy Theory Handbook
. NSC OPIR, 2020.
Deng, Xinyang
, and
Wen Jiang
.
"
A framework for the fusion of non-exclusive and incomplete information on the basis of D number theory
."
Applied Intelligence
(2022).
Федонюк, Сергій
.
Міжнародні аспекти безпеки кіберпростор
. Вежа-Друк: Луцьк , 2022.
Pages
« първа
‹ предишна
…
508
509
510
511
512
513
514
515
516
…
следваща ›
последна »
352161 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all