Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Sharkov, George
.
"
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
."
Information & Security: An International Journal
49 (2021): 49-69 .
Sharkov, George
.
"
A System-of-Systems Approach to Cyber Security and Resilience
."
Information & Security: An International Journal
37 (2017): 69-94.
Sharkov, George
, and
Christina Todorova
.
"
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
."
Information & Security: An International Journal
37 (2017): 95-102.
Blagoev, Ivan
.
Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems
., 2022.
Blagoev, Ivan
.
Application of Time Series Techniques for Random Number Generator Analysis
In
XXII Int. Conference DCCN
. Moscow, Russia, 2019.
Calzarossa, M.C.
, and
L. Massari
.
Analysis of header usage patterns of HTTP request messages
In
16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems
., 2014.
Hodges, J.
,
C. Jackson
, and
A. Barth
.
HTTP strict transport security
., 2012.
Yusof, I.
, and
A.S.K. Pathan
.
"
Mitigating cross-site scripting attacks with a content security policy
."
Computer
3, no. 49, (3) (2016): 56-63.
General Security Requirements for Equipment Using the Data Encryption Standard
., 1982.
Hankerson, Darrel
,
Alfred J. Menezes
, and
Scott Vanstone
.
"
Guide to Elliptic Curve Cryptography
."
Springer Professional Computing
(2004).
Stuttard, Dafydd
, and
Marcus Pinto
.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
., 2007.
Meyers, Mike
,
Scott Jernigan
, and
Mike Meyers
.
CompTIA Security+ Certification Guide
. 3rd ed. , Third Edition (Exam SY0-601) 3rd Edition, , 2021.
Tennoe, Mariam T.
, and
Susan F. Henssonow
.
Padding (Cryptography) Paperback
., 2010.
Gaurav, Akshat
, and
Brij B. Gupta
.
"
Identificación de transacciones fraudulentas en línea y protección: técnicas de vanguardia
."
ESIC Digital Economy and Innovation Journal
1, no. 3 (2022).
Nganga, Allan
,
Joel Scanlan
,
Margareta Lützhöft
, and
Steven Mallam
.
Timely Maritime Cyber Threat Resolution in a Multi-Stakeholder Environment
In
CYBER 2022 : The Seventh International Conference on Cyber-Technologies and Cyber-Systems
., 2022.
Ivančík, Radoslav
.
"
Specific Education of Students of The Academy of Police Force in the Field of Security Management
." In
Medzinárodná vedecká konferencia „Nové trendy profesijnej prípravy v Ozbrojených silách“
. Liptovský Mikuláš, 2022.
Porebski, Jakub
.
Occupancy grid environmental modeling for automotive applications
In
Automatics, Computer Science and Biomedical Engineering Department of Automatic Control and Robotics
. Vol. Doctoral Dissertation. Kraków : AGH University of Science and Technology Faculty of Electrical Engineering, 2022.
Herranen, Matias
.
Analysis of E-skills Found in Job Postings
In
Safety, Security and Risk Management
. Vol. Bachelor of Business Administration. Laurea University of Applied Sciences , 2022.
Shinohara, Mamoru
.
Evaluating the framework of maritime domain awareness in Japan: opportunities for improvement
In
Maritime Safety and Environmental Administration
. Vol. Master of Science in maritime affars. Malmö, Sweden: World Maritime University, 2022.
San Martin, Luis
, and
Jorge Vera
.
"
Modeling and optimization of capabilities for modular organizations under uncertainty
."
ORBIT
38 (2022): 17-22.
Nazir, Ahmad
,
Achmad Nur Sholeh
,
Akhmar Barsah
, and
Mochamad Aceng
.
"
The Effect of Leadership and Motivation on Productivity Employees at PT. ISS Indonesia Bintaro - South Tangerang
."
Jurnal Ad'ministrare
9, no. 1 (2022): 2011-2016.
Maathuis, Emanuela-Clara
.
Effects Assessment for Targeting Decisions Support in Military Cyber Operations
. Vol. PhD Dissertation. Delft, The Netherlands: Delft University of Technology, 2020.
Riley, Stan
.
Independent School Districts in Texas: A Focused Ethnography on Cybersecurity Barriers
. Scottsdale, AZ: Northcentral University, 2022.
Ebbeler, Raymond Walter
.
Following the Path of Small and Medium-Sized Medical Technology Startups Seeking Funding Before FDA Clearance
. Scottsdale, AZ: Northcentral University, 2022.
Yamin, Muhammad Mudassar
,
Mohib Ullah
,
Habib Ullah
,
Basel Katt
,
Mohammad Hijji
, and
Khan Muhammad
.
"
Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
."
Mathematics
10, no. 2 (2022): 2054.
Pages
« първа
‹ предишна
…
511
512
513
514
515
516
517
518
519
…
следваща ›
последна »
347720 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all