<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Ivan Gaydarski</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber risks, threats &amp; security measures associated with COVID-19</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">complex crisis situations</style></keyword><keyword><style  face="normal" font="default" size="100%">COVID-19</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">protection measures</style></keyword><keyword><style  face="normal" font="default" size="100%">techno-social threats &amp; risks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">37</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This analysis provides a brief overview of the ten live techno-social risks and threats associated with COVID-19 for 2020. Practical security measures are also presented. Literature data, industrial experience and research expertise gathered from &amp;ldquo;Secure Digital Future 21&amp;rdquo; initiative with some recent activities of the European Network of Cyber ​​Security Centers &amp;ndash; ECHO are jointly accomplished. The presented generalized results are giving current priority to threats and risks associated with: attacks on key online services and vulnerabilities in Home Office work organization. Other important issues are: phishing threats and malware attacks. Increased importance, but less expected one is going to emerge from: crypto-virus attacks, vulnerabilities in popular applications, robocall scams, fake apps and news, gray-market scams and malicious domains. Taking in mind these analytical findings, the security measures implementation should be organized with maximum automation, relying on intelligent security systems with multilevel organization. This from one hand will prevent the loss of data, information, technological and economic resources and, from another &amp;ndash; is expected to facilitate the everyday social activities through intelligent technological support for effective society transformation in the new digital reality.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Future Digital Society Transformational Transcendents &amp; Gaps Extended Outlook </style></title><secondary-title><style face="normal" font="default" size="100%">Romanian Cyber Security Journal </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">1</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Future Digital Society Resilience in the Informational Age</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><publisher><style face="normal" font="default" size="100%">SoftTrade</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Gaydarski</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modelling, Analysis, Experimental Validation and Verification of Information Security Systems in Corporate Environment</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Design of information security systems</style></keyword><keyword><style  face="normal" font="default" size="100%">DLP</style></keyword><keyword><style  face="normal" font="default" size="100%">interactive verification</style></keyword><keyword><style  face="normal" font="default" size="100%">multi-agent modelling &amp; simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">stochastic validation</style></keyword><keyword><style  face="normal" font="default" size="100%">UML architectural meta-design</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">132</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">1-28</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The publication presents an exploration approach for studying data protection in security systems within corporate environment. The approach is including: conceptual UML architecture design, together with further multi-agent system-of-systems modeling and holistic sensitivity analysis. The obtained results are next validated via an ad-hoc stochastic simulation, assuring expert, sensors&amp;rsquo; and machine-generated data flows fusing and usage. Finally, an interactive verification is performed with virtual corporate environment and futuristic, fictitious scenario dynamic observations of both trainees &amp;amp; technologies. An implementation of DLP monitoring for multiple data states and attacks jointly with selected set of users&amp;rsquo; feedback assessments are given in conclusion, assuring comprehensiveness of the obtained results.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Research-focused Cyber Exercises: National State-of-the-Art Academic Experience and Perspectives</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber research exercises</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity transcedents</style></keyword><keyword><style  face="normal" font="default" size="100%">foresighting digital futures</style></keyword><keyword><style  face="normal" font="default" size="100%">mixed reality</style></keyword><keyword><style  face="normal" font="default" size="100%">multicriteria assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">multimodal assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">verification</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper presents a practical approach for education and training, based on computer assisted, research-focused exercises in mixed cyber-physical realities. A respective solution has been developed in the last several years, encompassing academic research and training experience both at national and international level as a tool for verification of future cybersecurity transcedents. Special emphasis is placed on the polygon design and implementation, and user feedback from the usage for multimodal and multicriteria assessment of training effectiveness. Finally, the paper outlines some future trends towards extending mixed realities, advancing user monitoring and more effective and efficient training.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Pavlin Kutinchev</style></author><author><style face="normal" font="default" size="100%">Ivan Gaydarski</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Top 10 live threats to cyberspace in 2019</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">digital future</style></keyword><keyword><style  face="normal" font="default" size="100%">generalized landscape of significance</style></keyword><keyword><style  face="normal" font="default" size="100%">mixed digital reality</style></keyword><keyword><style  face="normal" font="default" size="100%">top 10 live threats</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2019</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">133</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">1-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The outlined overviews in the present study are aiming to mark the key assets for development of threats in the cyberspace for 2019. The major trend is outlining a priority role for cyberattacks on innovative technological solutions, concerning cloud services, smart mobiles and IoTs that are addressed by different malware activities and negative attempts from human factor, hardware and software perspectives in the mixed digital reality of the future. Encompassing at the same time both social and heterogeneous communicational smart networks with the active role of the humans. Additional accent is expected to emerge also from the regulations and policies for personal and corporate data, systems and services protection.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Mitko Bogdanoski</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Countering Terrorist Activities in Cyberspace</style></title><secondary-title><style face="normal" font="default" size="100%">NATO Science for Peace and Security Series - E: Human and Societal Dynamics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.iospress.nl/book/countering-terrorist-activities-in-cyberspace/</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">IOS Press</style></publisher><volume><style face="normal" font="default" size="100%">139</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">No single nation, culture or religion can achieve peace and security at home while ignoring the terrorist threats posed to others globally.
This book presents lectures and a keynote speech delivered as part of the NATO Advanced Training Course (ATC) Countering ISIS Radicalisation in the Region of South-East Europe (CIRACRESEE), held in Ohrid, Republic of Macedonia, in April 2017.
The main objective of the five-day ATC was to provide participants from the integrated security sector with information and knowledge about global trends with regard to the uses of cyberspace by ISIS, as well as accentuating the importance of the resulting social and technological challenges. An in-depth analysis of how these trends are influencing the region was also performed. The course topic was addressed from strategic/political, legal and technical perspectives, and participants were engaged in creating future regional policy proposals to counter ISIS use of cyberspace by engaging political, strategic, legal and technical components.
The 12 selected lectures presented here provide readers with a comprehensive analysis from a socio-cultural, organizational and technological perspective. Among the authors are well-known academics and security professionals with internationally proven expertise in their areas of work, and the book will be of interest to all those working in the field of counter-terrorism.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Data Relativities in the Transcending Digital Future</style></title><secondary-title><style face="normal" font="default" size="100%">BISEC 2018</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 20, 2018</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Belgrade, Serbia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">I. Gaydarski</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">R. Andreev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Model Driven Architectural Design of Information Security System</style></title><secondary-title><style face="normal" font="default" size="100%">14th International Conference on Information Assurance and Security (IAS 2018)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 13-15</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Porto, Portugal</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">I. Gaydarski</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Virtual Enterprise Data Protection: Framework Implementation with Practical Validation</style></title><secondary-title><style face="normal" font="default" size="100%">BISEC 2018</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 20, 2018</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Belgrade, Serbia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">I. Gaydarski</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Conceptual Modeling of an Information Security System and Its Validation through DLP Systems</style></title><secondary-title><style face="normal" font="default" size="100%">BISEC</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 18, 2017</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Belgrade, Serbia</style></pub-location><pages><style face="normal" font="default" size="100%">36-40</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">I. Gaydarski</style></author><author><style face="normal" font="default" size="100%">P. Kutinchev</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modelling &amp; Deployment of Data Protection Component of Information Security Systems</style></title><secondary-title><style face="normal" font="default" size="100%">First International Interdisciplinary Conference on Information and Cyber Security-Global, ICICSG’2017</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 20, 2017</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Istanbul</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoyan Poryazov</style></author><author><style face="normal" font="default" size="100%">Dmytro Progonov</style></author><author><style face="normal" font="default" size="100%">Emiliya Saranova</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Performance Prediction in Secure Telecommunication System with Quality of Service Guarantees</style></title><secondary-title><style face="normal" font="default" size="100%">The 9th International Conference on Business Information Security (BISEC-2017)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">18 October 2017</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://bisec.rs/files/2017/09-s-poryazov-d-progonov-e-saranova-z-minchev-bisec-2017.pdf</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Belgrade, Serbia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Challenges to Digital Ecosystems Dynamic Transformation</style></title><secondary-title><style face="normal" font="default" size="100%">BISEC 2017</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 18, 2017</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Belgrade, Serbia</style></pub-location><pages><style face="normal" font="default" size="100%">6-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">advanced persistent threats</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber space</style></keyword><keyword><style  face="normal" font="default" size="100%">human factor</style></keyword><keyword><style  face="normal" font="default" size="100%">proactive identification</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">123-136</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper looks into the issue of proactive advanced persistent threats (APTs) identification in modern social networks. As these threats are quite unnoticeable and require a long-term, comprehensive monitoring of both technologies and users, a hybrid methodological framework is proposed. A combination of: experts&amp;rsquo; knowledge and beliefs, system analysis and real environment interactive validation is presented to meet practical APT challenges. The obtained results provide an explanatory foundation for a better understanding the interaction process of the human factor with future technological developments and resulting threats advances in the evolving cyber space.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">123</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Methodological Approach for Modelling, Simulation &amp; Assessment of Complex Discrete Systems</style></title><secondary-title><style face="normal" font="default" size="100%">National Informatics Conference Dedicated to 80-th Anniversary of Prof. Petar Barnev</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">Institute of Mathematics &amp; Informatics, Bulgarian Academy of Sciences</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><pages><style face="normal" font="default" size="100%">102-110</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Georgi Dukov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Intelligence Decision Support in the Era of Big Data</style></title><secondary-title><style face="normal" font="default" size="100%">ESGI 113 Problems &amp; Final Reports Book</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Fastumprint</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">85-92</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">6</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Future Threats and Challenges in Cyberspace</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 3.0</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">31</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This report is based on an expert study and findings of related studies on the evolution of threats and challenges in cyberspace with a five-year outlook. The focus is technological and social aspect of current and future web solutions and services in the processes of communication and enhancing living environments in the digital age. We can forecast preservation of the role of the human factor as generator and user of technological innovation, with the consequent cyber threats in the new security environment. Anticipated threats in the 2020 horizon relate to the development of Web 3.0 technologies and 4G/5G communications, with emphasis on protection and control of personal space and data, cloud services, multimedia communication in social media, internet of things, robotic systems with artificial intelligence, and the effects of digital money. This report aims to support the development and the discussions of Bulgaria’s national cybersecurity strategy.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Human Factor Role for Cyber Threats Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Hybrid Challenges to Cyberspace and the Role of the Human Factor</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of International Scientific Conference “South-East Europe: New Threats for the Regional Security”</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://goo.gl/lXFeRz</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">New Bulgarian University</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Methodological Approach for Modelling, Simulation &amp; Assessment of Complex Discrete Systems</style></title><secondary-title><style face="normal" font="default" size="100%">National Conference on Informatics, dedicated to the 80th anniversary of the birth of Professor Peter Barnev</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multiple Human Biometrics Fusion in Support of Cyberthreats Identification</style></title><secondary-title><style face="normal" font="default" size="100%">Cybernetics and Information Technologies, Special Issue on Information Fusion</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">15</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">7</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Romania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">disaster preparedness</style></keyword><keyword><style  face="normal" font="default" size="100%">disaster response</style></keyword><keyword><style  face="normal" font="default" size="100%">Emergency Management Information System</style></keyword><keyword><style  face="normal" font="default" size="100%">National Emergency Management System</style></keyword><keyword><style  face="normal" font="default" size="100%">Romania</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">121</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Romania is highly vulnerable to catastrophic natural disasters. Firstly, it is situated in a seismically active region and has a history of devastating and deadly earthquakes – the most affecting happened in Vrancea in 1977. Furthermore, the Bucharest area has experienced a number of tremors of varying intensities, and the probability that a severe and damaging earthquake will occur is high. However, Romania is also at risk by other natural and technological hazards. More specifically, the floods in 2010 revealing weaknesses of the civil protection system triggered some process of improving. Of the former group, floods, drought and heat/cold waves have been experienced frequently, while the most affecting example of a man-made disaster has been the accident at the Baia Mare gold processing plant, where, in 2000, 100 000 cubic meters of toxic waste water spilled out and flooded into the Danube River, affecting Romania, Hungary, Ukraine, Serbia and Bulgaria. 

The Romanian crisis management concept views civil protection as a public policy issue, and as a civil operation during which the military could provide support with both assets and people. Crisis management does not rely on a centralised structure, but is a result of the interaction of parallel architectures. The latter involve bodies and agencies dealing with particular risks, while the crisis management system-of-systems employs an all-hazard approach. The most significant developments within the crisis management domain took place in 2004, as well as after the 2007 accession to the European Union. 

The National Emergency Management System (NEMS) is a nationally owned mechanism of multiple stakeholders, which provides coordination and response in case of emergencies, and serves as an advocate for prevention and disaster risk reduction at different levels. It is organised at four levels (national/governmental, ministerial, county and local), with a particular coordination and communication role for the national-level authorities. The system is led by the Prime Minister, supported by the National Committee for Emergency Situations and having the Minister of Administration and Interior as a chief executive. The main executive administrative body is the General Inspectorate for Emergency Situations (GIES), which coordinates plans and operational activities in cases of natural and man-made emergency situations. Specific plans are prepared at all administrative levels. Funding is provided through the state and local budgets, though they are used mostly for post-disaster rehabilitation and less for preventive measures.

The role of the private sector in the civil security system is limited, while NGOs cooperate closely with the state institutions, mostly in the fields of education and training. The number of organised volunteers is about 130 000. Regulations require that everyone be prepared to take care of himself in the immediate aftermath of major disasters. Every family and company should develop its own emergency plan, stock its own emergency survival kit, and ensure that each family member or company employee is familiarised with emergency procedures and can take precautions to protect their personal safety. However, in general, the society is not well organised at a community level and expectations that disaster management is a state responsibility are widely spread.

After Romania’s EU accession in 2007, the country improved its cooperation with international actors and increased its efforts to make the crisis management system coherent with international (particularly the EU) context. Romania has increased its engagement in the work of committees and working groups dealing with the EU’s civil protection. Romania has activated the EU’s Monitoring and Information Centre (MIC)  several times and contributed to several MIC-coordinated interventions providing support to Greece, Georgia, Hungary, Moldova and Turkey. Bilateral agreements or protocols are signed with some of the Romania’s neighbours (Bulgaria, Hungary, and Moldova), as well with other European (Czech, Denmark, France, the Netherlands, and Turkey) and non-European countries (Azerbaijan and the USA –with FEMA and USTDA).

The Romanian capacity for emergency response includes several niche capabilities: pyrotechnical capabilities for drainage, controlled breaches, and detonation, for water purification and transportation and for marine de-pollution. Military cargo aircraft are also available in cases of emergencies at home and abroad (C-27J Spartan – 6, C-130 Hercules – 3, and An-26 Curl – 4).</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Foundations in Cyber Space, Training Course Selected Materials</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dox.bg/files/dw?a=f42e63cffd</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Luben Boyanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">System Modelling &amp; Experimental Assessment of IoT Cybethreats in Future Smart Homes</style></title><secondary-title><style face="normal" font="default" size="100%">5th International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE – 2015)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 13-14th</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">UNWE</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Рунъния: Способности, Организация, Политики и Законодателство за Управление на Кризи и Отговор при Бедствия</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Юни 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">121</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Обект на настоящия доклад е Румъния – държава, силно уязвима от природни бедствия; разположена в сеизмично активен регион с история, белязана от разрушителни земетресения, и подложена на въздействието на множество рискове, например наводнения, суша и горещини. Докладът изследва концептуалната основа на управлението при кризи в Румъния и структурата на системата, в която основна координираща роля по отношение на планове и оперативни дейности играе Главният инспекторат за извънредни ситуации. Авторът отделя специално внимание на ролята на частния сектор и НПО, активни основно в сферата на образованието и обучението. Способностите на Румъния за реакция при кризи и извънредни ситуации се разглежда в контекста на международното сътрудничество в областта.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">L. Boyanov</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Challenges in Smart Homes, Cyber Security and Resiliency Policy Framework</style></title><secondary-title><style face="normal" font="default" size="100%">Cyber Security and Resiliency Policy Framework</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><volume><style face="normal" font="default" size="100%">38</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Threats Analysis In On-Line Social Networks With A Study On User Response</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">115</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The report presents a system model towards cyber threats analysis in on-line social networks, with consideration of multiple scenarios. An implementation of experts’ and users’ q-based surveys is made, together with experimental validation through biomonitoring of focus groups.
A correlation is observed between the experts’ identified and users’ validated obvious and hidden cyber threats in modern social networks that provide access to multiple services via smart devices and technologies. The study results demonstrate the need for developing new methods for improvement of user security in the modern digital world.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lyuben Boyanov</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Challenges in Smart Homes</style></title><secondary-title><style face="normal" font="default" size="100%">NATO ARW “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework&quot;</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 10-12, 2013</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">OS Press, NATO Science for Peace and Security Series - D: Information and Communication Security</style></publisher><pub-location><style face="normal" font="default" size="100%">Ohrid, Macedonia</style></pub-location><volume><style face="normal" font="default" size="100%">38</style></volume><pages><style face="normal" font="default" size="100%">99 – 114</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Сигурност в дигиталното общество. Технологични перспективи и предизвикателства.</style></title><secondary-title><style face="normal" font="default" size="100%">Юбилейна международна научна конференция &quot;Десет години образование по сигурност в НБУ: състояние и перспективи пред обучението в условия на динамична и труднопредвидима среда&quot;</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">„Планета-3“</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><pages><style face="normal" font="default" size="100%">438-444</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Nataliya Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Academic Research on Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">It4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">104</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Threats in Social Networks and Users’ Response Dynamics</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">dynamics</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">scenario method</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword><keyword><style  face="normal" font="default" size="100%">users response</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 2.0</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 3.0</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">105</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The report presents first results in a study on the opportunity to identify cyber threats in social networks with the help of experts’ knowledge and application of the scenario method. The process of validation is performed by two focus groups questionnaires-based surveys combined with experiments involving psycho-physiological monitoring. Study results conform with the hypothesis for users’ predisposition to hidden threats in known social network environment, related to social engineering. Additionally, correlated dynamic changes regarding studied users’ brain activity during regular surfing and entertainment activities have been also observed. The study provides a promising methodological framework for identification of obvious and hidden cyber threats in modern social networks, facilitated by already popular Web 2.0 technologies and emerging Web 3.0 solutions.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolving Academic Contribution to the Development of Bulgaria's Emergency Management Capabilities</style></title><secondary-title><style face="normal" font="default" size="100%">Early Recovery and Consequence Management in The Aftermath of Natural and Man-Made Disasters in the Greater Black Sea Area</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">January, 2012</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Center for East-European and Asian Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">Bucharest</style></pub-location><pages><style face="normal" font="default" size="100%">Bucharest, Romania</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Plamen Gatev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Psychophysiological Evaluation of Emotions due to the Communication in Social Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Scripta Scientifica Medica</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><volume><style face="normal" font="default" size="100%">44</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Кибер заплахи в социалните мрежи и  динамика на потребителскиите реакции</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">декември 2012 г.</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">105</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Настоящото изследване разглежда възможностите за идентифициране на киберзаплахи в социалните мрежи чрез използване на експертни знания и метода на сценариите. Извършена е валидация с анкетни данни от две фокус групи и експериментален психофизиологичен мониторинг. Получените резултати потвърждават хипотезата за предразположеност на потребители към скрити заплахи в социалните мрежи, свързани със социалния инженеринг. Допълнително беше наблюдавана и корелирана промяна в динамиката на мозъчната активност сред изследваните потребители при регулярно сърфиране и забавления. Всичко това дава добра методологична рамка за идентифицирането на явни и скрити киберзаплахи в съвременните социалните мрежи, породени от технологичното развитие, на вече наложилите се, Web 2.0 технологии и новоразвиващите се мобилни Web 3.0 решения.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Kiril Boianov</style></author><author><style face="normal" font="default" size="100%">Hristo Turlakov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Infrastructure Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">74</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity and cyberdefence – elements of smart defence in 21st Century</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">80</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Selected M&amp;S Capabilities with Application in the Security Area</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">79</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Основни способности в моделирането и симулациите с приложения в сферата на сигурността</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">79</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bulgarian Emergency Management System</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">52</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Five years research and development of information systems for security</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">61</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Ilia Nalbantov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">For a new approach to the modernization of the Bulgarian armed forces</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">54</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Processes and Threats in Social Networks: A Case Study</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">67</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">New Cyber Security Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">60</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">New threats in cyberspace</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">58</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Scenario Generation and Assessment Framework Solution in Support of the Comprehensive Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Symposium on “Analytical Support to Defence Transformation”, RTO-MP-SAS-081</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 26 – 28</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Boyana</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Threats and Challenges in Social Networks. A European Glance and Alliance Perspective in the Context of the New Strategic Concept</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">70</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">S. Georgiev</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Ch. Christova</style></author><author><style face="normal" font="default" size="100%">D. Philipova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">EEG Fractal Dimension Measurement before and after Human Auditory Stimulation</style></title><secondary-title><style face="normal" font="default" size="100%">BIO AUTOMATION</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author><author><style face="normal" font="default" size="100%">Georgi Dukov</style></author><author><style face="normal" font="default" size="100%">Stiliyan Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%"> EEG Spectral Analysis in Serious Gaming: An Ad Hoc Experimental Application</style></title><secondary-title><style face="normal" font="default" size="100%">BIO Automation</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><volume><style face="normal" font="default" size="100%">13</style></volume><pages><style face="normal" font="default" size="100%">79-88</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Joint Training Simulation and Analysis Center (JTSAC) Technical Report</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">27</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Rachev</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Context Scenarios for Defence Planning</style></title><secondary-title><style face="normal" font="default" size="100%">Methodology and scenarios for defense planning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Ministry of Defence, Directorate &quot;Defence Policy&quot;, Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Intelligent Scenario Development for CAX</style></title><secondary-title><style face="normal" font="default" size="100%">Scientific Support for the Decision Making in the Security Sector</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">NATO Science for Peace and Security Series</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Amsterdam: IOS Press</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Rachev</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Methodology for Designing Defence Planning Scenarios</style></title><secondary-title><style face="normal" font="default" size="100%">Methodology and scenarios for defense planning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Rachev</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Methodology for developing scenarios and context scenarios for defense planning</style></title><secondary-title><style face="normal" font="default" size="100%">Methodology and scenarios for defense planning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Ministry of Defence, Directorate &quot;Defence Policy&quot;, Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Методика за разработване на сценарии и контекстни сценарии за отбранително планиране</style></title><secondary-title><style face="normal" font="default" size="100%">Методология и сценарии за отбранително планиране</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Intelligent Scenario Development for Computer Assisted eXercises</style></title><secondary-title><style face="normal" font="default" size="100%">Scientific Support for the Decision Making in the Security Sector</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">IOS Press</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">White paper on the initial participation of Joint Training Simulation and Analyses Center in Computer Assisted eXercise for Crises Management</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><number><style face="normal" font="default" size="100%">09</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Analysis and adaptation of NC3A and NATO member countries’ models for analysis, estimation, decision-making, planning and management in emergency situations and support to the computer assisted staff exercises at national and regional level (SEE and the</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">08</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Анализ и адаптиране на модели от Агенцията С3 на НАТО и страните от ЕС и НАТО за анализ, оценка, вземане на решение, планиране, управление в извънредни ситуации и осигуряване на системата за компютърно-щабни учения на национално и регионално ниво</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">08</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>