{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Antonova, Gergana, Niya Prisadashka, Radoslav Dimitrov, Ioan Yonkov, Daniel Radev, Hristo Pavlov, Mario Mladenov, and Ilian Grigorov. \i Cybercrime Strategy (modeling example)\i0  In \i IT4Sec Reports\i0 ., 2023.\par \par Hranov, Nikolay Naydenov. \i Cybersecurity for Network Management Systems\i0  In \i IT4Sec Reports\i0 ., 2023.\par \par Kelemen, Roland. "The Impact of the Russian-Ukrainian Hybrid War on the European Union's Cybersecurity Policies and Regulations." \i Connections: The Quarterly Journal\i0  22, no. 2 (2023): 75-90.\par \par Georgiev, Venelin. \i Localism in cybersecurity ? mission impossible\i0  In \i IT4Sec Reports\i0 ., 2023.\par \par Iliev, Iliyan, and Ivan Blagoev. "An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage." \i Information & Security: An International Journal\i0  53, no. 1 (2022): 78-88 .\par \par Georgiev, Venelin. \i The ?Balance? As a Panacea for Achieving (Cyber)Security\i0  In \i IT4Sec Reports\i0 ., 2022.\par \par Mednikarov, Boyan, Yuliyan Tsonev, Borislav Nikolov, and Andon Lazarov. "Cyber Hygiene Issues in the Naval Security Environment." \i Information & Security: An International Journal\i0  53, no. 2 (2022): 205-218.\par \par Georgiev, Venelin. \i Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard\i0  In \i IT4Sec Reports\i0 ., 2022.\par \par Alm\'e9n, Casper, Nicholas Hagstr\'f6m, and Jyri Rajam\'e4ki. "ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector." \i Information & Security: An International Journal\i0  53, no. 1 (2022): 11-20.\par \par Jurga?a, Piotr, Tytus Kurek, and Marcin Niemiec. "Preserving Privacy of Security Services  in the SecaaS Model." \i Information & Security: An International Journal\i0  53, no. 1 (2022): 47-64 .\par \par Sharkov, George, Christina Todorova, Georgi Koykov, and Ivan Nikolov. "Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience." \i Information & Security: An International Journal\i0  53, no. 2 (2022): 287-302.\par \par Georgiev, Venelin. \i Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities\i0  In \i IT4Sec Reports\i0 ., 2021.\par \par Ivanov, Yordan Shterev. "Concepts in Networks and Communication Security and Graph Theory." \i Information & Security: An International Journal\i0  50, no. 2 (2021): 205-210 .\par \par Holovkin, Bohdan M., Oleksii V. Tavolzhanskyi, and Oleksandr V. Lysodyed. "Corruption as a Cybersecurity Threat in the New World Order." \i Connections: The Quarterly Journal\i0  20, no. 2 (2021): 75-87.\par \par Ruoslahti, Harri, Janel Coburn, Amir Trent, and Ilkka Tikanm\'e4ki. "Cyber Skills Gaps ? A Systematic Review of the Academic Literature." \i Connections: The Quarterly Journal\i0  20, no. 2 (2021): 33-45.\par \par Rajam\'e4ki, Jyri, and Heikki H\'e4m\'e4l\'e4inen. "Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES." \i Information & Security: An International Journal\i0  50, no. 1 (2021): 103-116 .\par \par Sharkov, George. "Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques." \i Information & Security: An International Journal\i0  49 (2021): 49-69 .\par \par Gdowski, Bart?omiej, Rafa? Ko?ciej, and Marcin Niemiec. "Heuristic-based Intrusion Detection Functionality in a Snort Environment." \i Information & Security: An International Journal\i0  50, no. 1 (2021): 23-36 .\par \par Panagiotou, Panos, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kompatsiaris. "Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods." \i Information & Security: An International Journal\i0  50, no. 1 (2021): 37-48 .\par \par Wallis, Tania, Chris Johnson, and Mohamed Khamis. "Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study  of the Effectiveness of the UK Implementation of the NIS Directive." \i Information & Security: An International Journal\i0  48, no. 1 (2021): 36-68.\par \par Tur?an\'edk, Michal. "Network User Behaviour Analysis by Machine Learning Methods." \i Information & Security: An International Journal\i0  50, no. 1 (2021): 66-78 .\par \par Blagoev, Ivan, Todor Balabanov, and Iliyan Iliev. "RSA Weaknesses Caused by the Specifics of Random Number Generation." \i Information & Security: An International Journal\i0  50, no. 2 (2021): 171-179 .\par \par Sharkov, George, Christina Todorova, Georgi Koykov, and Georgi Zahariev. "A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising." \i Information & Security: An International Journal\i0  50, no. 2 (2021): 129-148 .\par \par Mednikarov, Boyan, Yuliyan Tsonev, and Andon Lazarov. "Analysis of Cybersecurity Issues in the Maritime Industry." \i Information & Security: An International Journal\i0  47, no. 1 (2020): 27-43.\par \par Georgieva, Nikoleta. "Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy." \i Information & Security: An International Journal\i0  46, no. 3 (2020): 311-320.\par \par Fluri, Philipp, and Todor Tagarev. "The Concept of Resilience: Security Implications and Implementation Challenges." \i Connections: The Quarterly Journal\i0  19, no. 3 (2020): 5-12.\par \par Tagarev, Todor, George Sharkov, and Andon Lazarov. "Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions." \i Information & Security: An International Journal\i0  47, no. 1 (2020): 7-10.\par \par Kok, Arvid, Ivana Ilic Mestric, Giavid Valiyev, and Michael Street. "Cyber Threat Prediction with Machine Learning." \i Information & Security: An International Journal\i0  47, no. 2 (2020): 203-220.\par \par Boshnakova, Gabriela. \i Cyber threats modification during the COVID-19. Cyber pandemia\i0  In \i IT4Sec Reports\i0 ., 2020.\par \par Atanasov, Stanislav. \i Cybersecurity Risks and Challenges in the Covid-19 Pandemic\i0  In \i CSDM Views\i0 ., 2020.\par \par Andreev, Evgeni, Mariya Nikolova, and Veselka Radeva. "Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base." \i Information & Security: An International Journal\i0  46, no. 3 (2020): 321-333.\par \par Yanakiev, Yantsislav. "A Governance Model of a Collaborative Networked Organization for Cybersecurity Research." \i Information & Security: An International Journal\i0  46, no. 1 (2020): 79-98.\par \par Rajam\'e4ki, Jyri, and Vasilis Katos. "Information Sharing Models for Early Warning Systems of Cybersecurity Intelligence." \i Information & Security: An International Journal\i0  46, no. 2 (2020): 198-214.\par \par Tabansky, Lior. "Israel Defense Forces and National Cyber Defense." \i Connections: The Quarterly Journal\i0  19, no. 1 (2020): 45-62.\par \par Tagarev, Todor, Salvatore Marco Pappalardo, and Nikolai Stoianov. "A Logical Model for Multi-Sector Cyber Risk Management." \i Information & Security: An International Journal\i0  47, no. 1 (2020): 13-26.\par \par Blagoev, Ivan. "Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." \i Information & Security: An International Journal\i0  47, no. 1 (2020): 62-76.\par \par Dimov, Dimo, and Yuliyan Tsonev. "Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack." \i Information & Security: An International Journal\i0  47, no. 3 (2020): 317-327.\par \par Stoianov, Nikolai, and Andrey Ivanov. "Public Key Generation Principles Impact Cybersecurity." \i Information & Security: An International Journal\i0  47, no. 2 (2020): 249-260.\par \par Stetsenko, Inna V., and Maksym Demydenko. "Signature-based Intrusion Detection Hardware-Software Complex." \i Information & Security: An International Journal\i0  47, no. 2 (2020): 221-231.\par \par Aaltola, Kirsi, and Harri Ruoslahti. "Societal Impact Assessment of a Cyber Security Network Project." \i Information & Security: An International Journal\i0  46, no. 1 (2020): 53-64.\par \par Pleskach, Mariia, Valentyna Pleskach, Andrii Semenchenko, Danylo Myalkovsky, and Taras Stanislavsky. "Standardization in the Field of Cybersecurity and Cyber Protection in Ukraine." \i Information & Security: An International Journal\i0  45 (2020): 57-76.\par \par Georgiev, Venelin. \i The Variety of University Cyber Security Programs - Is it Useful and Justified?\i0  In \i CSDM Views\i0 ., 2020.\par \par Mengidis, Notis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kompatsiaris. "Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities." \i Information & Security: An International Journal\i0  43, no. 1 (2019): 21-33.\par \par Rajam\'e4ki, Jyri, Ilkka Tikanm\'e4ki, and Jari R\'e4s\'e4nen. "CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain." \i Information & Security: An International Journal\i0  43, no. 2 (2019): 215-235.\par \par Tagarev, Todor, and George Sharkov. \i Computationally intensive functions in designing and operating distributed cyber secure and resilient systems\i0  In \i 20th International Conference on Computer Systems and Technologies, CompSysTech 2019\i0 . Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.\par \par Saranov, Nikola. "Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues." \i Information & Security: An International Journal\i0  43, no. 1 (2019): 98-112.\par \par P\'f6yh\'f6nen, Jouni, Viivi Nuojua, Martti Lehto, and Jyri Rajam\'e4ki. "Cyber Situational Awareness and Information Sharing in Critical Infrastructure Organizations." \i Information & Security: An International Journal\i0  43, no. 2 (2019): 236-256.\par \par Tagarev, Todor. "DIGILIENCE - A Platform for Digital Transformation,  Cyber Security and Resilience." \i Information & Security: An International Journal\i0  43, no. 1 (2019): 7-10.\par \par Kopchev, Valeri. "The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination." \i Information & Security: An International Journal\i0  42 (2019): 67-81.\par \par Fiebig, Tobias. "\i Governance Challenges for European Cybersecurity Policies: Stakeholders Views\i0 ." In \i DIGILIENCE 2019\i0 ., 2019.\par \par Matta, Walter, and Alessandro Cantelli-Forti. "An innovative Airport Physical-cyber Security System (APSS)." \i Information & Security: An International Journal\i0  43, no. 3 (2019): 285-293.\par \par Tagarev, Todor, and Dimitrina Polimirova. \i Main considerations in elaborating organizational information security policies\i0  In \i 20th International Conference on Computer Systems and Technologies, CompSysTech 2019\i0 . Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.\par \par Yanakiev, Yantsislav, and Dimitrina Polimirova. "\i The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria\i0 ." In \i DIGILIENCE 2019\i0 . Sofia, Bulgaria, 2019.\par \par Shalamanov, Velizar. "Strategy, Partnerships and Human Capital for Cyber Resilience." \i Information & Security: An International Journal\i0  42 (2019): 5-12.\par \par Zaslavskyi, Volodymyr, and Maya Pasichna. "System Approach Towards the Creation of Secure and Resilient Information Technologies in the Energy Sector." \i Information & Security: An International Journal\i0  43, no. 3 (2019): 318-330.\par \par Aaltola, Kirsi, and Petteri Taitto. "Utilising Experiential and Organizational Learning Theories to Improve Human Performance in Cyber Training." \i Information & Security: An International Journal\i0  43, no. 2 (2019): 123-133.\par \par Costigan, Sean, and Greg Gleason. "What If Blockchain Cannot Be Blocked? Cryptocurrency and International Security." \i Information & Security: An International Journal\i0  43, no. 1 (2019): 13-20.\par \par Chim, William. "Russia?s Digital Awakening." \i Connections: The Quarterly Journal\i0  17, no. 2 (2018): 5-17.\par \par Tagarev, Todor, George Sharkov, and Nikolai Stoianov. "Cyber Security and Resilience of Modern Societies: A Research Management Architecture." \i Information & Security: An International Journal\i0  38 (2017): 93-108.\par \par Petrov, Lachezar, Nikolai Stoianov, and Todor Tagarev. \i Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study\i0  In \i Advances in Dependability Engineering of Complex Systems, Proceedings of the Twelfth International Conference on Dependability Problems and Complex Systems DepCoS-RELCOMEX\i0 . Brunow, Poland, 2016.\par \par Vain, J\'fcri, and Vyacheslav Kharchenko. "Enhanced Education for Cybersecurity and Resilience." \i Information & Security: An International Journal\i0  35, no. 1 (2016): 5-8.\par \par Skarga-Bandurova, Inna, Alexandr Ryazantsev, and Katerina Kiryushatova. "An Experience Report on Education and Training Programme in Cybersecurity of Critical Infrastructures." \i Information & Security: An International Journal\i0  35, no. 2 (2016): 123-132.\par \par Tagarev, Todor. "A Generic Reference Curriculum on Cybersecurity." \i Information & Security: An International Journal\i0  35, no. 2 (2016): 181-184.\par \par Collier, Raymond. "The Obama Administration and Incident Response: A Report." \i Information & Security: An International Journal\i0  34, no. 2 (2016): 105-120.\par \par Pot, ii, Oleksandr V., and Roman V. Oliynykov. "Ukrainian Educational System in the Field of Cybersecurity." \i Information & Security: An International Journal\i0  35, no. 1 (2016): 11-27.\par \par Spinu, Natalia. "Creating and Strengthening Cybersecurity in the Republic of Moldova." \i Information & Security: An International Journal\i0  32, no. 2 (2015): 97-108.\par \par Okuku, Angela, Karen Renaud, and Brandon Valeriano. "Cybersecurity Strategy?s Role  in Raising Kenyan Awareness  of Mobile Internet Threats." \i Information & Security: An International Journal\i0  32, no. 2 (2015): 155-174.\par \par Atalay, Ata, and Gurur Sanci. "Cyberterrorism and Turkey?s Counter-Cyberterrorism Efforts." \i Information & Security: An International Journal\i0  32, no. 1 (2015): 42-64.\par \par Vitel, Philippe, and Henrik Bilddal. "French Cyber Security and Defence: An Overview." \i Information & Security: An International Journal\i0  32, no. 1 (2015): 29-41.\par \par Minchev, Zlatogor. \i Future Threats and Challenges in Cyberspace\i0  In \i CSDM Views\i0 . Sofia: Centre for Security and Defence Management, 2015.\par \par Georgiev, Venelin. \i Levels of Cybersecurity Training and Education\i0  In \i IT4Sec Reports\i0 . Sofia: Institute of Information and Communication Technologies, 2015.\par \par Chernukhin, ?hor. "New Challenges to Information Security Caused by the Introduction of Wi-Fi Technologies." \i Information & Security: An International Journal\i0  31 (2014): 79-86.\par \par Ivanova, Yoana. \i Policies for the Protection of Critical Infrastructure from Cyber Attacks\i0  In \i IT4Sec Reports\i0 . Sofia: Institute of Information and Communication Technologies, 2014.\par \par Bik, Volodymyr. "Protecting the National Interests in the Domain of Information Security as a Functional Task of the SBU." \i Information & Security: An International Journal\i0  31 (2014): 69-72.\par \par Milina, Velichka. \i Cybersecurity: A National Strategic Issue\i0  In \i IT4Sec Reports\i0 . Sofia: Institute of Information and Communication Technologies, 2013.\par \par Urciuoli, Luca, Toni M\'e4nnist\'f6, Juha Hintsa, and Tamanna Khan. "Supply Chain Cyber Security ? Potential Threats." \i Information & Security: An International Journal\i0  29, no. 1 (2013): 51-68.\par \par Li, Xingan. "Cybersecurity as a Relative Concept." \i Information & Security: An International Journal\i0  18 (2006): 11-24.\par \par }