One approach of using key-dependent S-BOXes in AES N Stoianov International Conference on Multimedia Communications, Services and Security …, 2011 | 13 | 2011 |
Cyber Security and Resilience of Modern Societies: A Research Management Architecture T Tagarev, G Sharkov, N Stoianov Information & Security 38, 93-108, 2017 | 9 | 2017 |
Security infrastructures: Towards the INDECT system security N Stoianov, M Urueña, M Niemiec, P Machník, G Maestro International Conference on Multimedia Communications, Services and Security …, 2012 | 9 | 2012 |
Integrated security infrastructures for law enforcement agencies N Stoianov, M Urueña, M Niemiec, P Machnik, G Maestro Multimedia Tools and Applications 74 (12), 4453-4468, 2015 | 8 | 2015 |
Assessing Mission Impact of Cyberattacks: Report of the NATO IST-128 Workshop A Kott, N Stoianov, N Baykal, A Moller, R Sawilla, P Jain, M Lange, C Vidu arXiv preprint arXiv:1601.00912, 2016 | 6 | 2016 |
One software tool for testing square s-boxes N Stoianov arXiv preprint arXiv:1009.2476, 2010 | 5 | 2010 |
AES S-BOX generator: analysis of requirements N Stoianov International Science Conference, 2009 | 5 | 2009 |
INDECT advanced security requirements M Uruena, P Machník, M Martinez, M Niemiec, N Stoianov arXiv preprint arXiv:1009.2491, 2010 | 3 | 2010 |
Proof of Stake for Blockchain Based Distributed Intrusion Detecting System I Burmaka, N Stoianov, V Lytvynov, M Dorosh, S Lytvyn International scientific-practical conference, 237-247, 2020 | 2 | 2020 |
Integrative Approach to Understand Vulnerabilities and Enhance the Security of Cyber-Bio-Cognitive-Physical Systems T Tagarev, N Stoianov, G Sharkov European Conference on Cyber Warfare and Security, 492-XIX, 2019 | 2 | 2019 |
Traffic Abnormalities Identification Based on the Stationary Parameters Estimation and Wavelet Function Detailization N Stoianov, V Lytvynov, I Skiter, S Lytvyn International scientific-practical conference, 83-95, 2019 | 2 | 2019 |
Corporate networks protection against attacks using content-analysis of global information space V Lytvynov, N Stoianov, I Skiter, H Trunova, A Hrebennyk Технічні науки та технології, 115-130, 2018 | 2 | 2018 |
Security architecture for law enforcement agencies M Urueña, P Machník, M Niemiec, N Stoianov Multimedia Tools and Applications, 1-24, 2014 | 2 | 2014 |
INDECT Security Architecture M Urueña, P Machník, M Niemiec, N Stoianov International Conference on Multimedia Communications, Services and Security …, 2013 | 2 | 2013 |
Overview of the security components of INDECT project N Stoianov, M Urueña, M Niemiec, P Machník, G Maestro International Conference on Multimedia Communications, Services and Security …, 2011 | 2 | 2011 |
Public Key Generation Principles Impact Cybersecurity N Stoianov, A Ivanov Information & Security 47 (2), 249-260, 2020 | 1 | 2020 |
A Novel Keystream Generator with Cryptographic Purpose N Nikolov, N Stoianov International Conference on Multimedia Communications, Services and Security …, 2012 | 1 | 2012 |
TOWARDS SECURITY REQUIREMENTS OF THE SPIDER PROJECT NT Stoianov, MG Bozhilova, GR Velev СБОРНИК НАУЧНИ ТРУДОВЕ, 25, 0 | 1 | |
A STUDY OF LATTICE-BASED CRYPTOGRAPHY N STOIANOV, M BOZHILOVA | 1 | |
New Approach of Solving Congruence Equation System AG Ivanov, NT Stoianov International Conference on Multimedia Communications, Services and Security …, 2020 | | 2020 |