Open Access
Issue
MATEC Web Conf.
Volume 292, 2019
23rd International Conference on Circuits, Systems, Communications and Computers (CSCC 2019)
Article Number 01044
Number of page(s) 5
Section Circuits and Systems
DOI https://doi.org/10.1051/matecconf/201929201044
Published online 24 September 2019
  1. National Cyber Security Strategy “Cyber Resilient Bulgaria” Sofia, 2016 [Google Scholar]
  2. R. Trifonov, S. Manolov Application of multi-agent systems for network and information protection Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18 - 19 September 2014, Varna, Bulgaria [Google Scholar]
  3. R. Trifonov, G. Tsochev, S. Manolov, Radoslav Yoshinov, G. Pavlova, A Survey of Artificial Intelligence for Enhancing the Information Security, Int. J. of Development Research, 07, 11, November (2017), pp.16866-16872, ISSN: 2230-9926 [Google Scholar]
  4. R. Trifonov, S. Manolov, R. Yoshinov, G. Tsochev, G. Pavlova, Artificial Intelligence Methods for Cyber Threats Intelligence, Int. J. of Computers, 2 (2017) pp. 129-135, ISSN: 2367-8895, [Google Scholar]
  5. R. Trifonov, G. Tsochev, R. Yoshinov, S. Manolov and G. Pavlova. Conceptual model for cyber intelligence network security system, Int. J. of Computers, 11 (2017) pp. 85-92,ISSN: 1998-4308 [Google Scholar]
  6. R. Trifonov, S.Manolov , R. Yoshinov , G. Tsochev, G. Pavlova. An adequate response to new Cyber Security challenges through Artificial Intelligence methods. Applications in Business and Economics, WSEAS Transactions on Business and Economics, 14 (2017) pp. 272 - 281, E-ISSN: 2224-2899 [Google Scholar]
  7. R. Trifonov, G. Tsochev, S. Manolov, R. Yoshinov, G. Pavlova, Increasing the level of network and information security using artificial intelligence, Fifth Intl. Conf. Advances in Computing, Communication and Information Technology- CCIT 2-3 September (2017) Zurich, Swiss, ISBN: 978-1-63248-131-3 [Google Scholar]
  8. R. Trifonov, G. Tsochev, G. Pavlova, R. Yoshinov, S. Manolov, Adaptive Optimization Techniques for Intelligent Network Security, 4th International Conference on Mathematics and Computers in Sciences and Industry MCSI (2017), August 24-26, Corfu Island, Greece, Conference Publishing Services of IEEE [Google Scholar]
  9. R. Trifonov, G. Tsochev, R. Yoshinov, S. Manolov, G. Pavlova, Conceptual model for cyber intelligence network security system, Int. J. of Computers, 11 (2017) ISSN: 1998-4308 [Google Scholar]
  10. R. Trifonov, O. Nakov, P. Vatchkov, S. Manolov, R. Yoshinov, G. Popov, G. Tsochev, G. Pavlova. Intelligent methods and Cybersecurity, ХХV Conference Telecom (2017) 26-27 October, NSTC, Sofia, Bulgaria, p. 113-120 [Google Scholar]
  11. R. Trifonov, S. Manolov, R. Yoshinov, G. Tsochev, S. Nedev, G. Pavlova, Operational Cyber Threat Intelligence supported by Artificial Intelligence methods. Proceedings of the International Conference on Information Technologies (InfoTech-2018) 20 - 21 September (2018) Varna, Bulgaria [Google Scholar]
  12. R. Trifonov, S. Manolov, R. Yoshinov, G. Tsochev, G. Popov, G. Pavlova, New Approaches in the Examination of the Cyber Threats. Proceedings of the International Conference on Information Technologies (InfoTech-2018) 20 - 21 September (2018) Varna, Bulgaria [Google Scholar]
  13. ENISA Threats Landscape Report 2016: 15 Top Cyber-Threats and Trends, ENISA, January (2017) [Google Scholar]
  14. Computer Security Incident Handling Guide Special Publication 800-61 Revision 2 NIST, August (2012) [Google Scholar]
  15. Good Practice Guide for Incident Management, ENISA (2010) [Google Scholar]
  16. Strategies for Incident Response and Cyber Crisis Cooperation Version 1.1, ENISA, August (2016) [Google Scholar]
  17. Request for Comments 1297 “Internal Integrated Trouble Ticket System – Functional Specification Wishlist” Merit Network, Inc. January (1992) [Google Scholar]
  18. R. Young AI-driven automation for Incident Management, Astound, March 8, ( 2017) [Google Scholar]
  19. Security Team’s Operational Requirements Milestone MS2.4.2. GN3-10-073 GEANT (2014) [Google Scholar]
  20. R.S. Sutton Reinforcement Learning An Introduction Cambridge University Press (1998) [Google Scholar]
  21. K. Arulkumaran, M.P. Deisenroth, M. Brundage, A.A. Bharath A Brief Survey of Deep Reinforcement Learning IEEE Signal Processing Magazine Special Issue on Deep Learning for Image Understanding Nov. (2017) [Google Scholar]
  22. G. Popov and K. Raynova, Diversity in nature and technology — Tool for increase the reliability of systems, 15th International Conference on Electrical Machines, Drives and Power Systems (ELMA), Sofia (2017) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.