Biblio
Export 8 results:
Filters: Keyword is vulnerability [Clear All Filters]
Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221-231.
"Hybrid Warfare: Emerging Research Topics." Information & Security: An International Journal 39, no. 3 (2018): 289-300.
"Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training." Information & Security: An International Journal 35, no. 1 (2016): 99-120.
"Cybersecurity: A National Strategic Issue In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2013.
Why the Organization Needs Information Security Policy and Programme In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2013.
Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities." Information & Security: An International Journal 28, no. 1 (2012): 98-107.
"Intrusion-Avoidance via System Diversity." Information & Security: An International Journal 28, no. 1 (2012): 154-158.
"Model and Implementation of Safety Case Cores." Information & Security: An International Journal 28, no. 2 (2012): 286-295.
"