Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 77 results:
RTF
EndNote XML
Filters:
Keyword
is
Cybersecurity
[Clear All Filters]
2023
Antonova, Gergana
,
Niya Prisadashka
,
Radoslav Dimitrov
,
Ioan Yonkov
,
Daniel Radev
,
Hristo Pavlov
,
Mario Mladenov
, and
Ilian Grigorov
.
Cybercrime Strategy (modeling example)
In
IT4Sec Reports
., 2023.
DOI
Google Scholar
RTF
EndNote XML
Hranov, Nikolay Naydenov
.
Cybersecurity for Network Management Systems
In
IT4Sec Reports
., 2023.
DOI
Google Scholar
RTF
EndNote XML
Kelemen, Roland
.
"
The Impact of the Russian-Ukrainian Hybrid War on the European Union's Cybersecurity Policies and Regulations
."
Connections: The Quarterly Journal
22, no. 2 (2023): 75-90.
DOI
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
Localism in cybersecurity – mission impossible
In
IT4Sec Reports
., 2023.
DOI
Google Scholar
RTF
EndNote XML
2022
Iliev, Iliyan
, and
Ivan Blagoev
.
"
An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage
."
Information & Security: An International Journal
53, no. 1 (2022): 78-88 .
DOI
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
The ‘Balance’ As a Panacea for Achieving (Cyber)Security
In
IT4Sec Reports
., 2022.
DOI
Google Scholar
RTF
EndNote XML
Mednikarov, Boyan
,
Yuliyan Tsonev
,
Borislav Nikolov
, and
Andon Lazarov
.
"
Cyber Hygiene Issues in the Naval Security Environment
."
Information & Security: An International Journal
53, no. 2 (2022): 205-218.
DOI
Google Scholar
RTF
EndNote XML
Georgiev, Venelin
.
Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard
In
IT4Sec Reports
., 2022.
DOI
Google Scholar
RTF
EndNote XML
Almén, Casper
,
Nicholas Hagström
, and
Jyri Rajamäki
.
"
ECHO Early Warning System as a Preventive Tool against Cybercrime in the Energy Sector
."
Information & Security: An International Journal
53, no. 1 (2022): 11-20.
DOI
Google Scholar
RTF
EndNote XML
Jurgała, Piotr
,
Tytus Kurek
, and
Marcin Niemiec
.
"
Preserving Privacy of Security Services in the SecaaS Model
."
Information & Security: An International Journal
53, no. 1 (2022): 47-64 .
DOI
Google Scholar
RTF
EndNote XML
Sharkov, George
,
Christina Todorova
,
Georgi Koykov
, and
Ivan Nikolov
.
"
Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience
."
Information & Security: An International Journal
53, no. 2 (2022): 287-302.
DOI
Google Scholar
RTF
EndNote XML
2021
Georgiev, Venelin
.
Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities
In
IT4Sec Reports
., 2021.
DOI
Google Scholar
RTF
EndNote XML
Ivanov, Yordan Shterev
.
"
Concepts in Networks and Communication Security and Graph Theory
."
Information & Security: An International Journal
50, no. 2 (2021): 205-210 .
DOI
Google Scholar
RTF
EndNote XML
Holovkin, Bohdan M.
,
Oleksii V. Tavolzhanskyi
, and
Oleksandr V. Lysodyed
.
"
Corruption as a Cybersecurity Threat in the New World Order
."
Connections: The Quarterly Journal
20, no. 2 (2021): 75-87.
DOI
Google Scholar
RTF
EndNote XML
Ruoslahti, Harri
,
Janel Coburn
,
Amir Trent
, and
Ilkka Tikanmäki
.
"
Cyber Skills Gaps – A Systematic Review of the Academic Literature
."
Connections: The Quarterly Journal
20, no. 2 (2021): 33-45.
DOI
Google Scholar
RTF
EndNote XML
Rajamäki, Jyri
, and
Heikki Hämäläinen
.
"
Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES
."
Information & Security: An International Journal
50, no. 1 (2021): 103-116 .
DOI
Google Scholar
RTF
EndNote XML
Sharkov, George
.
"
Harnessing the Potential of AI Against Covid-19 through the Lens of Cybersecurity: Challenges, Tools, and Techniques
."
Information & Security: An International Journal
49 (2021): 49-69 .
Google Scholar
RTF
EndNote XML
Gdowski, Bartłomiej
,
Rafał Kościej
, and
Marcin Niemiec
.
"
Heuristic-based Intrusion Detection Functionality in a Snort Environment
."
Information & Security: An International Journal
50, no. 1 (2021): 23-36 .
DOI
Google Scholar
RTF
EndNote XML
Panagiotou, Panos
,
Notis Mengidis
,
Theodora Tsikrika
,
Stefanos Vrochidis
, and
Ioannis Kompatsiaris
.
"
Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods
."
Information & Security: An International Journal
50, no. 1 (2021): 37-48 .
DOI
Google Scholar
RTF
EndNote XML
Wallis, Tania
,
Chris Johnson
, and
Mohamed Khamis
.
"
Interorganizational Cooperation in Supply Chain Cybersecurity: A Cross-Industry Study of the Effectiveness of the UK Implementation of the NIS Directive
."
Information & Security: An International Journal
48, no. 1 (2021): 36-68.
DOI
Google Scholar
RTF
EndNote XML
Turčaník, Michal
.
"
Network User Behaviour Analysis by Machine Learning Methods
."
Information & Security: An International Journal
50, no. 1 (2021): 66-78 .
DOI
Google Scholar
RTF
EndNote XML
Blagoev, Ivan
,
Todor Balabanov
, and
Iliyan Iliev
.
"
RSA Weaknesses Caused by the Specifics of Random Number Generation
."
Information & Security: An International Journal
50, no. 2 (2021): 171-179 .
DOI
Google Scholar
RTF
EndNote XML
Sharkov, George
,
Christina Todorova
,
Georgi Koykov
, and
Georgi Zahariev
.
"
A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising
."
Information & Security: An International Journal
50, no. 2 (2021): 129-148 .
DOI
Google Scholar
RTF
EndNote XML
2020
Mednikarov, Boyan
,
Yuliyan Tsonev
, and
Andon Lazarov
.
"
Analysis of Cybersecurity Issues in the Maritime Industry
."
Information & Security: An International Journal
47, no. 1 (2020): 27-43.
DOI
Google Scholar
RTF
EndNote XML
Georgieva, Nikoleta
.
"
Comparison between the Cyber Operations Majors in the United States Naval Academy and the Bulgarian Naval Academy
."
Information & Security: An International Journal
46, no. 3 (2020): 311-320.
DOI
Google Scholar
RTF
EndNote XML
Pages
1
2
3
4
next ›
last »
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance