<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iliyan Iliev</style></author><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">HLS</style></keyword><keyword><style  face="normal" font="default" size="100%">IPTV</style></keyword><keyword><style  face="normal" font="default" size="100%">live streaming</style></keyword><keyword><style  face="normal" font="default" size="100%">RTMP</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">78-88 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The invention of television changed the world and made information spread faster. For the past few years, broadcast television has remained digital only and IP networks have emerged as an additional broadcast option. Regardless of the infrastructure used by a given broadcaster, some channels or even special content require a specific payment scheme and implement conditional access. This study proposes an approach for secure video streaming and preventing video content from easily leaking due to cyber security issues. The proposed methods cover both aspects – the content itself and the protection of subscribers’ personal data when using live streaming services.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">78</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Iliyan Iliev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Level of maturity of the Cybersecurity of the infrastructure in the domain iict.bas.bg</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">E-Mail</style></keyword><keyword><style  face="normal" font="default" size="100%">firewall</style></keyword><keyword><style  face="normal" font="default" size="100%">FTP</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Services</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">143</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Description of the level of maturity of the IT infrastructure for the domain iict.bas.bg.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Method for Evaluating the Vulnerability of Random Number Generators for Cryptographic Protection in Information Systems</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://bpos.bg/publication/18449 </style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Tatiana Atanasova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">RNG Entropy Enrichment to Improve Cybersecurity in IoT and Cloud Services</style></title><secondary-title><style face="normal" font="default" size="100%">2022 International Conference on Communications, Information, Electronic and Energy Systems (CIEES)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">24-26 November</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Veliko Tarnovo, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author><author><style face="normal" font="default" size="100%">Ilian Iliev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Randomness in Shared Web Hostings</style></title><secondary-title><style face="normal" font="default" size="100%">BGSIAM’21. 16th Annual Meeting of the Bulgarian Section of SIAM</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 21–23</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author><author><style face="normal" font="default" size="100%">Iliyan Iliev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">RSA Weaknesses Caused by the Specifics of Random Number Generation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">random numbers gen-eration</style></keyword><keyword><style  face="normal" font="default" size="100%">RSA algorithm</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">171-179 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;The rapid entry in digital transformation and Covid-19 moved many activities to the Internet. The application of cybersecurity tools gives a sense of good security condition of the used digital services. This is often how things look on the surface, but the problems sometimes is hard to notice. The current study presents weaknesses in the still widely used cryptographic algorithm RSA, which allows RSA cryptographic keys to be compromised. It demonstrates the connection with RNG as the root of all the resulting controversies around the issues under consideration.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Vladimir Monov</style></author><author><style face="normal" font="default" size="100%">Gergana Vassileva</style></author><author><style face="normal" font="default" size="100%">Ivo Blagoev</style></author><author><style face="normal" font="default" size="100%">Silvia Matern</style></author><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Model of ICT Competence Development  for Digital Transformation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">e-learning</style></keyword><keyword><style  face="normal" font="default" size="100%">ICT competences</style></keyword><keyword><style  face="normal" font="default" size="100%">ICT Personnel development</style></keyword><keyword><style  face="normal" font="default" size="100%">ICT taxonomies</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">269-284</style></pages><abstract><style face="normal" font="default" size="100%">The article presents a conceptual framework for development of a model for building of advanced digital competences for digital transformation in cyber resilient environment. It identifies key research areas to support the development and implementation of the model and describes the current results of engaging with the key stakeholders from administration, academia and industry. The focus is on defining the framework for implementing the proposed model in a form of ICT Academy, supported by an e-Platform, governed in most effective way under the COBIT principles and using an innovative e-learning approach. Comparative analysis is made with the development of the NATO Communications and Information Academy (NCI Academy) as an instrument to support the digital endeavour of NATO in order to identify the good practices for the development of a National ICT academy, being able to be part of the trusted collaborative network of the NCI Academy as well.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">269</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Vladimir Monov</style></author><author><style face="normal" font="default" size="100%">Gergana Vassileva</style></author><author><style face="normal" font="default" size="100%">Ivo Blagoev</style></author><author><style face="normal" font="default" size="100%">Silvia Matern</style></author><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A model of ICT competence development for digital transformation</style></title><secondary-title><style face="normal" font="default" size="100%">Digilience, 2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">Varna, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">cryptography protocols</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">digitization</style></keyword><keyword><style  face="normal" font="default" size="100%">PRNG</style></keyword><keyword><style  face="normal" font="default" size="100%">RNG</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Services</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">62-76</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The provision of cybersecurity is of basic importance for every effective information system. It is possible to provide most rich information services, but only one neglected cybersecurity risk may compromise the system and all services it provides. Therefore, meeting the cybersecurity requirements is a prerequisite for the safety and security of IT infrastructures, digital resources, and the protection of private data. In that respect, the themes of cryptography and sufficiently robust random number generation are of particular interest. This article looks for the “golden ratio” between the provision of mass services and the efforts to meet cybersecurity requirements. It suggests a method and discusses the possibilities to increase the cryptographic protection in information systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">62</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Application of Time Series Techniques for Random Number Generator Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">XXII Int. Conference  DCCN </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><pub-location><style face="normal" font="default" size="100%">Moscow, Russia</style></pub-location><pages><style face="normal" font="default" size="100%">437-446</style></pages><isbn><style face="normal" font="default" size="100%">978-5-209-09683-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gergana Vassileva</style></author><author><style face="normal" font="default" size="100%">Vladimir Monov</style></author><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">E-learning model for personalised online education based on data analysis and competence profile</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Education and New Learning Technologies “EDULEARN19”</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July, 2019</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Palma de Mallorca Spain</style></pub-location><pages><style face="normal" font="default" size="100%">3726-3732</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Vladimir Monov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Criteria and Methodology for the Evaluation of e-Learning Management Systems based on the Specific Needs of the Organization</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Education and Information Technologies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">134-141</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>