<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Boris Bozveliev</style></author><author><style face="normal" font="default" size="100%">Sotir Sotirov</style></author><author><style face="normal" font="default" size="100%">Tihomir Videv</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Generalized Net Model of Possible Drone’s Communication Control Cyber Theft with Intuitionistic Fuzzy Estimations</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Fuzzy sets</style></keyword><keyword><style  face="normal" font="default" size="100%">generalized nets</style></keyword><keyword><style  face="normal" font="default" size="100%">open TX</style></keyword><keyword><style  face="normal" font="default" size="100%">radio receiver</style></keyword><keyword><style  face="normal" font="default" size="100%">radio transmitter</style></keyword><keyword><style  face="normal" font="default" size="100%">RX</style></keyword><keyword><style  face="normal" font="default" size="100%">telemetry</style></keyword><keyword><style  face="normal" font="default" size="100%">TX</style></keyword><keyword><style  face="normal" font="default" size="100%">UAV</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">35-44</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article looks into the control of small, helicopter-like drones. They are more formally known as unmanned aerial vehicles (UAVs). Basically, a drone is a flying computerized machine that can be remotely controlled or fly autonomously through software-controlled flight plans in their embedded systems, working in conjunction with onboard sensors and a GPS receiver. Drones can be helpful or dangerous to us depending of their intended use. In the underlying study we use fuzzy estimations and, in this article, present a generalized net model of such a system and demonstrate the possibility of taking control over the communication between the transmitter and the receiver.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">35</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tihomir Videv</style></author><author><style face="normal" font="default" size="100%">Boris Bozveliev</style></author><author><style face="normal" font="default" size="100%">Sotir Sotirov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber systems</style></keyword><keyword><style  face="normal" font="default" size="100%">generalized nets</style></keyword><keyword><style  face="normal" font="default" size="100%">Intuitionistic fuzzy estimation</style></keyword><keyword><style  face="normal" font="default" size="100%">smart house</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">45-53</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The turbulent development of the digital technologies in the last few years inevitably led to their usage in all areas of life, including our homes. The technological benefits are demonstrated in the control and management of the so called “Smart House.” By extending our opportunities with the remote controller, which provides an enormous freedom of the user, there also comes the threat of breaking in and taking control of the “Smart House.” This article reviews the cyber threats to the “Smart House” and provides an analysis by using fuzzy estimations for the possible ways of breaking through the system’s defence and interfering with its activities. Various options for preventing cyber threats in such environments are also presented.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">45</style></section></record></records></xml>