Cybersecurity
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy
A Concept for Establishing a Security Operations and Training Centre at the Bulgarian Naval Academy." Information & Security: An International Journal 46, no. 1 (2020): 27-35.
4602_nikolov_sotc_nvna.pdf — Downloaded 1650 times
"
Security Analysis of Diceware Passphrases
Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
4719_diceware_passphrases.pdf — Downloaded 3490 times
"
A New Steganographic Algorithm for Hiding Messages in Music
A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
4718_hiding_messages_in_music.pdf — Downloaded 2463 times
"
Public Key Generation Principles Impact Cybersecurity
Public Key Generation Principles Impact Cybersecurity." Information & Security: An International Journal 47, no. 2 (2020): 249-260.
4717_public_key_generation.pdf — Downloaded 1952 times
"
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space." Information & Security: An International Journal 47, no. 2 (2020): 233-246.
4716_diffie-hellman_big_data.pdf — Downloaded 1875 times
"
Signature-based Intrusion Detection Hardware-Software Complex
Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221-231.
4715_signature-based_ids.pdf — Downloaded 2833 times
"
Cyber Threat Prediction with Machine Learning
Cyber Threat Prediction with Machine Learning." Information & Security: An International Journal 47, no. 2 (2020): 203-220.
4714_cyber_threat_assessment.pdf — Downloaded 2523 times
"
Information Technology for Big Data Sensor Networks Stability Estimation
Information Technology for Big Data Sensor Networks Stability Estimation." Information & Security: An International Journal 47, no. 1 (2020): 141-154.
4710_big_data_sensor_networks_stability_estimation.pdf — Downloaded 1917 times
"
Tactical Approach to Cyber Defence in IoT Computer Networks
Tactical Approach to Cyber Defence in IoT Computer Networks." Information & Security: An International Journal 47, no. 1 (2020): 135-140.
4709_tactical_cyber_defense_iot.pdf — Downloaded 1721 times
"
A Cost-Effective Approach to Securing Systems through Partial Decentralization
A Cost-Effective Approach to Securing Systems through Partial Decentralization." Information & Security: An International Journal 47, no. 1 (2020): 109-121.
4707_decentralization.pdf — Downloaded 1901 times
"