Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Ниво на зрялост на кибер сигурността на инфраструктурата в домейна iict.bas.bg.

it4sec_reports_148_1.pdf

Publication Type:

Report

Authors:

Велизар Шаламанов; Иван Благоев; Илиян Илиев

Source:

(2022)
  • 2772 reads
  • Google Scholar
  • RTF
  • EndNote XML

References

Blagoev, Ivan. "Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." Information & Security: An International Journal 47, no. 1 (2020): 62-76.
Blagoev, Ivan. Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems., 2022.
Blagoev, Ivan, Todor Balabanov, and Iliyan Iliev. "RSA Weaknesses Caused by the Specifics of Random Number Generation." Information & Security: An International Journal 50, no. 2 (2021): 171-179 .
Blagoev, Ivan. Application of Time Series Techniques for Random Number Generator Analysis In XXII Int. Conference DCCN . Moscow, Russia, 2019.
Blagoev, Ivan. Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems., 2022.
Calzarossa, M.C., and L. Massari. Analysis of header usage patterns of HTTP request messages In 16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems., 2014.
Hodges, J., C. Jackson, and A. Barth. HTTP strict transport security., 2012.
Yusof, I., and A.S.K. Pathan. "Mitigating cross-site scripting attacks with a content security policy." Computer 3, no. 49, (3) (2016): 56-63.
General Security Requirements for Equipment Using the Data Encryption Standard., 1982.
Hankerson, Darrel, Alfred J. Menezes, and Scott Vanstone. "Guide to Elliptic Curve Cryptography." Springer Professional Computing (2004).
Stuttard, Dafydd, and Marcus Pinto. The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws., 2007.
Meyers, Mike, Scott Jernigan, and Mike Meyers. CompTIA Security+ Certification Guide. 3rd ed. , Third Edition (Exam SY0-601) 3rd Edition, , 2021.
Tennoe, Mariam T., and Susan F. Henssonow. Padding (Cryptography) Paperback., 2010.

Active calls for articles

Hybrid Operations

Deadline:
15.09.2025

Check also our Google Scholar profile

  • Downloads
  • How to cite
  • File Name: it4sec_reports_148_1.pdf
    Size: 1.08 MB
    Number of Downloads: 894
APA style: , Благоев И., & Илиев И. (2022).  Ниво на зрялост на кибер сигурността на инфраструктурата в домейна iict.bas.bg..
Chicago style: , Иван Благоев, and Илиян Илиев. Ниво на зрялост на кибер сигурността на инфраструктурата в домейна iict.bas.bg.., 2022.
IEEE style: , И. Благоев, and И. Илиев, Ниво на зрялост на кибер сигурността на инфраструктурата в домейна iict.bas.bg., 12/2022.
  • Trending
  • Latest
  • Most cited
  • The Weaponization of Emerging Technologies and Their Impact on Global Risk: A Perspective from the PfPC Emerging Security Challenges Working Group (1,618)
  • Goodbye Globalization? Hello 'Fragmentegration'! - The World Economy and Strategic Competition (1,222)
  • Towards a New Role for the European Union in the South Caucasus? (1,202)
  • Hybrid Threats and Strategic Competition (1,202)
  • The PfP Consortium Regional Stability in South East Europe Working Group at 25: The Transformed Balkans and the Work Ahead (1,108)
view all
  • Communicating (In)Security in Ukraine
  • Hybrid Warfare in the Black Sea Region: Russian Information-Psychological Operations in Georgia
  • Ukraine's Component in the Platform of European Memory and Conscience
  • Kremlin's 'War on Terrorism' in the Northeastern Caucasus: How Chechnya Still 'Saves' Russia
  • A Theory of Change: 25 Years of the Partnership for Peace Consortium
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
From Civil-Military Relations to Resilience: The Fifth Wave of Strengthening Democracy through Research and Education (4)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2025
This site was designed and is maintained by Procon Ltd., Executive publisher of Connections: The Quarterly Journal