- Network Security and Intrusion Detection
- Information and Cyber Security
- Smart Grid Security and Resilience
- Advanced Malware Detection Techniques
- Mobile Agent-Based Network Management
- Blockchain Technology Applications and Security
- Cognitive Science and Mapping
- Advanced Data Processing Techniques
- Digital Transformation in Industry
- IoT and Edge/Fog Computing
- Economic and Technological Systems Analysis
- Infective Endocarditis Diagnosis and Management
- Spam and Phishing Detection
- Cybersecurity and Information Systems
- Infectious Disease Case Reports and Treatments
- IPv6, Mobility, Handover, Networks, Security
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Evolutionary Algorithms and Applications
- Opinion Dynamics and Social Influence
- IoT-based Smart Home Systems
- Educational Games and Gamification
- Actinomycetales infections and treatment
- Innovative Educational Technologies
- Internet of Things and AI
Technical University of Sofia
2017-2025
Medical University Plovdiv
2023
Embedded Systems (United States)
2021
Online Technologies (United States)
2021
Bulgarian Academy of Sciences
2019-2020
Software (Spain)
2020
South East European University
2019
Sofia University "St. Kliment Ohridski"
2019
This systematic review answers questions about whether or not a model of metacognition is well accepted and if it can be used in cognitive architecture design. Self-planning, self-monitoring, self-evaluation are the concepts, which viewed as metacognitive experiences. A newly formulated theoretical approach named Attention Action was targeted, shown to In order link approach, specific concepts like mental imagery learning experience were researched. The method includes statistical analysis...
Nowadays, computer and network system maintenance is just as important their protection. Grow into the systems that are posted on many different websites with payment function this seen needed sensitive information to any organization. Viruses represent one of most successful ways attack these use inevitably part business worldwide. The identification and/or verification must be protected by recommendable antivirus software, firewalls etc well multiple other technologies created protect...
The Faculty of Computer Systems and Technologies the Technical University Sofia has chosen a development strategy for Cyber-security Education based on: international standardization documents; conceptual model developed by Joint Task Force on Cybersecurity Education; good practices modular structure dynamic building principles allowing rapid changes to content. Based "Knowledge Areas" "Application Areas", each discipline is intended be as workflow particular application area composed...
Accounting and financial classification prediction problems are high challenge researchers use different methods to solve them. Methods instruments for short time of operations using artificial neural network considered. The methods, used data as well the developed forecasting system with described in paper. architecture a four technical indicators, which based on raw current day week is presented. movement stock prices one ahead consists an input layer, hidden layer output layer. training...
The implementation of an information system is a complex process.It even more when it comes to business systems.These systems have now evolved into what are commonly known as enterprise systems.Then the threat cyberattacks must also be considered.In this paper we make brief overview major systems.Based on literature review identified most common vulnerabilities associated with them and some recommendations for stopping different kind threats against them.
The world is entering its new era of the industrial systems. endless development technology has undoubtedly improved efficiency processes. Internet Things essential to us these days. real and virtual worlds are already beginning merge into production, ushering in Industry 4.0 or fourth Industrial Revolution. In this article, we will discuss ways companies should approach security challenges inherent market, as well some recommendations them.
Too often, the unified security programs, based on comprehensive analy ses of information from across IT infrastructure, are costly, complex, difficult to implement and inefficient. As a result, most organizations lack accurate threat detection informed risk - management capabilities. Therefore, response new threats can be “security intelligence” approach. It is art ificial intelligence use its methods protect cybercrimes. The aim this study present compare different artificial intel ligence...
With the advent of digital technologies as an integral part today’s everyday life, risk information security breaches is increasing. Email spam, commonly known junk email, continues to pose a significant challenge in realm, inundating inboxes with unsolicited and often irrelevant messages. This relentless influx spam not only disrupts user productivity but also raises concerns, it frequently serves vehicle for phishing attempts, malware distribution, other cyber threats. The prevalence...
Decision making in critical situations is a complex process. There are many processes to consider. This paper describes theoretical approach researching attentional and automatic unconscious terms of metacognition. An application the presented explain decision metacognition as solution for ineffective cognitive biases during crisis situation. Evidence from studies on neuropsychology, control, architectures. recently formulated semiotic methodology implemented that allows design conceptual...
The fourth industrial revolution often referred as Industry 4.0 poses a great cybersecurity risk for Supervisory control and data acquisition (SCADA) systems. Lot of enterprises are changing the energy dependency that they have to be on wind power. These SCADA systems vulnerable against different kinds cyberattacks due IT OT convergence challenges observed. Thus, allowing attackers successfully exploit manipulate farm During our research concept attack scenarios going introduced. leveraging...
Artificial Intelligence (AI) is a very promising field of development, in many directions. It widespread computer technology (biotechnology, nanotechnology, Internet Things, etc.) as well robotics, 3D printing, quantum computing, and more. Using it to predict defend from cyber attacks another its applications. In conduct project study the security cyber-physical connections context next-generation networks, an overview AI methods their application Industry 4.0 has been made. More attention...
The Faculty of Computer Systems and Technology at Technical University – Sofia undertook analyses experiments on the use Artificial Intelligence methods in field Information Security. In course study a Cyber Defence related to classification consisting three phases has been proposed: Operative Intelligence, Tactical Incident Handling. It found that there is no universal method effective for all mentioned above applications. each case, set criteria should be developed select (and then...
In the current age, cyber security is an essential element of any information system. A key aspect in critical infrastructure, where has become a top priority for and network experts. The interoperability ICT infrastructure with other components it important its life cycle. Because Supervisory Control Data Acquisition (SCADA) systems form part their protection particularly strategically industrial sites — power plants, refineries, oil pipelines, treatment manufacturing facilities,...
This article presents a brief overview of the effect new technologies, how they are changing manufacturing process, and machines starting to get lot smarter thanks artificial intelligence. The focus is over examination Industry 4.0 it revolutionized whole segment what promise better, more efficient future brings. analysis focuses primarily on intelligence integrated, benefits brings, big an improvement basic programming. Part research based 771 publications tracked past three five years....
An issue of the Internet Things security which does not belong to traditional problem cybersecurity, as it is a local or distributed monitoring and/or physical systems state connected via Internet, considered. architecture Supervisory Control and Data Acquisition system (SCADA) was considered in previous authors studies. Due SCADA implementation, vulnerabilities various options cyberattacks on them were analyzed. As an example, case study based trees considered, obtained results summarized...
The present paper describes some of the results obtained in Faculty Computer Systems and Technology at Technical University Sofia implementation project related to application intelligent methods for increasing security computer networks. Also is made a survey about existing hybrid methods, which are using several artificial cyber defense. introduces model intrusion detection systems where multi agent bases intelligence applicable by means simple real-time models constructed laboratory environment.
Simulation methodology is becoming increasingly popular among computer network researchers worldwide in time of COVID pandemic. For selecting an appropriate simulator for a particular application, it important to have knowledge the tools available, along with their advantages and disadvantages. The basic ways installation are explained. A proposal good practice online simulators conducting laboratory exercises on networks has been made.
Computer security is defined as the protection of computer systems against threats to confidentiality, integrity and availability. Penetration a set actions compromise integrity, availability resources. To monitor events that occur in or networks called intrusion detection system (IDS). This paper introduces model for IDS based on multi-agent artificial intelligence.
An overview and analysis of security development standards best practices, as well comparison programming languages from the position code are presented in this paper. As a result conducted analysis, set principles criteria for secure software defined order to prevent accidental vulnerabilities programs.