<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Ivan Gaydarski</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber risks, threats &amp; security measures associated with COVID-19</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">complex crisis situations</style></keyword><keyword><style  face="normal" font="default" size="100%">COVID-19</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">protection measures</style></keyword><keyword><style  face="normal" font="default" size="100%">techno-social threats &amp; risks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">37</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This analysis provides a brief overview of the ten live techno-social risks and threats associated with COVID-19 for 2020. Practical security measures are also presented. Literature data, industrial experience and research expertise gathered from &amp;ldquo;Secure Digital Future 21&amp;rdquo; initiative with some recent activities of the European Network of Cyber ​​Security Centers &amp;ndash; ECHO are jointly accomplished. The presented generalized results are giving current priority to threats and risks associated with: attacks on key online services and vulnerabilities in Home Office work organization. Other important issues are: phishing threats and malware attacks. Increased importance, but less expected one is going to emerge from: crypto-virus attacks, vulnerabilities in popular applications, robocall scams, fake apps and news, gray-market scams and malicious domains. Taking in mind these analytical findings, the security measures implementation should be organized with maximum automation, relying on intelligent security systems with multilevel organization. This from one hand will prevent the loss of data, information, technological and economic resources and, from another &amp;ndash; is expected to facilitate the everyday social activities through intelligent technological support for effective society transformation in the new digital reality.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Gaydarski</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Design of information security systems</style></keyword><keyword><style  face="normal" font="default" size="100%">DLP</style></keyword><keyword><style  face="normal" font="default" size="100%">interactive verification</style></keyword><keyword><style  face="normal" font="default" size="100%">multi-agent modelling &amp; simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">stochastic validation</style></keyword><keyword><style  face="normal" font="default" size="100%">UML architectural meta-design</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">132</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">1-28</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The publication presents an exploration approach for studying data protection in security systems within corporate environment. The approach is including: conceptual UML architecture design, together with further multi-agent system-of-systems modeling and holistic sensitivity analysis. The obtained results are next validated via an ad-hoc stochastic simulation, assuring expert, sensors&amp;rsquo; and machine-generated data flows fusing and usage. Finally, an interactive verification is performed with virtual corporate environment and futuristic, fictitious scenario dynamic observations of both trainees &amp;amp; technologies. An implementation of DLP monitoring for multiple data states and attacks jointly with selected set of users&amp;rsquo; feedback assessments are given in conclusion, assuring comprehensiveness of the obtained results.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Pavlin Kutinchev</style></author><author><style face="normal" font="default" size="100%">Ivan Gaydarski</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Top 10 live threats to cyberspace in 2019</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">digital future</style></keyword><keyword><style  face="normal" font="default" size="100%">generalized landscape of significance</style></keyword><keyword><style  face="normal" font="default" size="100%">mixed digital reality</style></keyword><keyword><style  face="normal" font="default" size="100%">top 10 live threats</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2019</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">133</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">1-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The outlined overviews in the present study are aiming to mark the key assets for development of threats in the cyberspace for 2019. The major trend is outlining a priority role for cyberattacks on innovative technological solutions, concerning cloud services, smart mobiles and IoTs that are addressed by different malware activities and negative attempts from human factor, hardware and software perspectives in the mixed digital reality of the future. Encompassing at the same time both social and heterogeneous communicational smart networks with the active role of the humans. Additional accent is expected to emerge also from the regulations and policies for personal and corporate data, systems and services protection.&lt;/p&gt;</style></abstract></record></records></xml>