Nikolai T. Stoianov

Orcid: 0000-0002-4953-4172

According to our database1, Nikolai T. Stoianov authored at least 20 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Implications of the arithmetic ratio of prime numbers for RSA security.
Int. J. Appl. Math. Comput. Sci., 2023

2022
Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities.
Proceedings of the Multimedia Communications, Services and Security, 2022

2020
Multi-sector Assessment Framework - a New Approach to Analyse Cybersecurity Challenges and Opportunities.
Proceedings of the Multimedia Communications, Services and Security, 2020

New Approach of Solving Congruence Equation System.
Proceedings of the Multimedia Communications, Services and Security, 2020

2017
Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study.
Proceedings of the Advances in Dependability Engineering of Complex Systems, 2017

2016
Security architecture for law enforcement agencies.
Multim. Tools Appl., 2016

Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop.
CoRR, 2016

2015
Integrated security infrastructures for law enforcement agencies.
Multim. Tools Appl., 2015

2013
INDECT Security Architecture.
Proceedings of the Multimedia Communications, Services and Security, 2013

2012
Security Infrastructures: Towards the INDECT System Security.
Proceedings of the Multimedia Communications, Services and Security, 2012

A Novel Keystream Generator with Cryptographic Purpose.
Proceedings of the Multimedia Communications, Services and Security, 2012

2011
Overview of the Security Components of INDECT Project.
Proceedings of the Multimedia Communications, Services and Security, 2011

One Approach of Using Key-Dependent S-BOXes in AES.
Proceedings of the Multimedia Communications, Services and Security, 2011

2010
E-net models for distribution, access and use of resources in security information systems
CoRR, 2010

E-Net Models of a Software System for Web Pages Security SECURITY
CoRR, 2010

E-Net Models of a Software System for E-Mail Security
CoRR, 2010

INDECT Advanced Security Requirements
CoRR, 2010

One software tool for testing square s-boxes
CoRR, 2010

A Protection Approach for Video Information transmitted in TCP/IP based networks
CoRR, 2010

The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem)
CoRR, 2010


  Loading...