Main considerations in elaborating organizational information security policies T Tagarev, D Polimirova Proceedings of the 20th International Conference on Computer Systems and …, 2019 | 12 | 2019 |
Cognition horizon and the theory of hyper-random phenomena II Gorban, A Zakrevskij, T Stupina, O Siedlecka, E Ilina, I Nowotyńska, ... International Journal “Information Theories & Applications 16 (1), 5-24, 2009 | 8 | 2009 |
Exploring the Role of the Human Factor in Cybersecurity: Results from an Expert Survey in Bulgaria Y Yanakiev, D Polimirova Information & Security: An International Journal 44, 39-50, 2020 | 3 | 2020 |
Analysis of malicious attacks accomplished in real and virtual environment D Polimirova, E Nickolov New Trends in Intelligent Technologies, 53-60, 2009 | 3 | 2009 |
Research of the Influence of methods of compression on the co-efficient of information security of objects under attacks D Polimirova, E Nickolov, C Nikolov Institute of Information Theories and Applications FOI ITHEA, 2007 | 3 | 2007 |
Investigating The Relations Of Attacks, Methods And Objects In Regard To Information Security In Network TCP/IP Environment D Polimirova, E Nickolov, C Nikolov Institute of Information Theories and Applications FOI ITHEA, 2007 | 3 | 2007 |
Real-time system for assessing the information security of computer networks D Polimirova, E Nickolov Open Research Problems in Network Security: IFIP WG 11.4 International …, 2011 | 2 | 2011 |
Study of the Information Security of File Objects under Information Attacks with a Record of Effect of the Methods of Compression D Polimirova-Nickolova Serdica Journal of Computing 2 (3), 295p-312p, 2008 | 2 | 2008 |
Application of methods of multi-criteria evaluation in choosing a method of compression as a means of heightening the information security of system and applied objects D Polimirova, E Nickolov, C Nickolov Institute of Information Theories and Applications FOI ITHEA, 2007 | 2 | 2007 |
EXAMINATION OF ARCHIVED OBJECTS’SIZE INFLUENCE ON THE INFORMATION SECURITY WHEN COMPRESSION METHODS ARE APPLIED D Polimirova–Nickolova, E Nickolov Third International Conference Information Research, Applications and …, 2005 | 2 | 2005 |
Intelligent Data Processing in Global Monitoring for Environment and Security, Chapter 9: Methods and Means for Protection of Software Critical Infrastructures VV Polimirova, D., Nickolov, E., Kr. Markov ITHEA, 2011 | | 2011 |
The Cloud Computing and Computer Virology “облачни изчисления” и компютърна вирусология E Nickolov, D Polimirova Union of Bulgarian Mathematicians 40 (1), 89-96, 2011 | | 2011 |
The Cloud Computing and Computer Virology E Nickolov, D Polimirova Union of Bulgarian Mathematicians, 2011 | | 2011 |
Analysis of Information Security of Objects under Attacks and Processed by Methods of Compression D Polimirova-Nickolova, E Nickolov Institute of Information Theories and Applications FOI ITHEA, 2008 | | 2008 |
Examination of Passwords’ Influation on the Compressing Process of Non-Encrypted Objects D Polimirova-Nickolova, E Nickolov Institute of Information Theories and Applications FOI ITHEA, 2005 | | 2005 |
INFORMATION SECURITY OF ARCHIVED OBJECTS D Polimirova–Nickolova ICT&P 2004, 89, 2004 | | 2004 |
Analysis of Security in Archiving D Polimirova-Nickolova Institute of Information Theories and Applications FOI ITHEA, 2004 | | 2004 |
INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT OF FILE OBJECTS D Polimirova, E Nickolov INFORMATION THEORIES & APPLICATIONS, 114, 1993 | | 1993 |
CONTEMPORARY CYBER-SECURITY TRENDS AND RELATED ETHICAL DILEMMAS (PART 1) V BONTCHEV, D POLIMIROVA ЕТИЧЕСКИ ИЗСЛЕДВАНИЯ, 35, 0 | | |
Софийски университет „Св. Климент Охридски “ НП Петрова | | |