MATEC Web Conf.
Volume 133, 2017BulTrans-2017 – 9th International Scientific Conference on Aeronautics, Automotive and Railway Engineering and Technologies
|Number of page(s)||5|
|Published online||07 November 2017|
- Y. Ivanova, Military Journal, Sofia, 4, 113-126 (2015). [Google Scholar]
- S. Jajodia, S. Noel, B. O’Berry, Managing Cyber Threats: Issues, Approaches and Challenges, Kluwer Academic Publisher, 248-250 (2005). [EDP Sciences] [Google Scholar]
- G. Weidman, No Starch Press Inc., San Francisco, 2-6 (2014). [Google Scholar]
- E. Stoilov, Department of Informatics at NBU, Sofia, 21-28 (2010). [Google Scholar]
- SANS Institute. Honey Pots and Honey Nets – Security through Deception, 1-5 (2003). [Google Scholar]
- Riverbed Technology, Riverbed Modeler: A Suite of Protocols and Technologies with a Sophisticated Development Environment, San Francisco (2017). [Google Scholar]
- Y. Ivanova, IJITS, issue 3, vol. 9, 117-142 (2017). [Google Scholar]
- Y. Ivanova, IJITS, issue 2, vol. 9, 83-95 (2017). [Google Scholar]
- B. Ghena, W. Beyer, A. Hillaker, J. Pevarnek. & A. J. Halderman, Green Lights Forever: Analyzing the Security of Traffic Infrastructure, Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ’14) (2014). [Google Scholar]
- E. Stoilov, Department of Informatics at NBU, Sofia, 32-36 (2011). [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.