<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoyan Mechev</style></author><author><style face="normal" font="default" size="100%">Elisaveta Staneva</style></author><author><style face="normal" font="default" size="100%">Mariyan Rachev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity Problems and Solutions in Operating Systems of Mobile Communications Devices</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">300-305</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Mobile communications devices use a variety of communication modes some of which can put those devices at great risks. This article explores weaknesses in some protocols exploited by simple Denial-of-Service attacks. The authors present also a solution to one of them, where the at-tack is executed using an ESP8266 microchip.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">300</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yavor Dechev</style></author><author><style face="normal" font="default" size="100%">Borislav Nikolov</style></author><author><style face="normal" font="default" size="100%">Mariyan Rachev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Distance Learning at the Nikola Vaptsarov Naval Academy Utilising Online Platforms during the COVID-19 Crisis</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">classroom</style></keyword><keyword><style  face="normal" font="default" size="100%">distance learning</style></keyword><keyword><style  face="normal" font="default" size="100%">Microsoft Teams</style></keyword><keyword><style  face="normal" font="default" size="100%">Moodle</style></keyword><keyword><style  face="normal" font="default" size="100%">Skype for Business</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">293-303</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the current digital world, using information technology in the study process is necessary and in some situations is even mandatory. In some cases, distance learning is the only option. The choice of a suitable plat-form or a combination of platforms to conduct distance learning can be quite challenging. The main reasons for this are the multiple platforms available, and the numerous criteria and limitations when scoring and using these platforms. This article examines some of the technologies, used for distance learning. After a comparative analysis, an option is presented for the integration of the Microsoft Teams platform in Nikola Vaptsarov Naval Academy’s distance learning system.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">293</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elisaveta Staneva</style></author><author><style face="normal" font="default" size="100%">Mariyan Rachev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Tactical Approach to Cyber Defence in IoT Computer Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">architecture</style></keyword><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">135-140</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Securing Internet of Things’ devices has been an ongoing struggle since the technology's recognition. Finding methods to prevent or counter those threats through the experience of the hackers themselves is a promising way of securing these devices. The approach described in this article uses that experience and transforms it into useful models and algorithms for IoT security.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">135</style></section></record></records></xml>