Petar Boyanov
Petar Boyanov
PhD, Associate Professor of National Security, Konstantin Preslavsky University of Shumen
Verified email at shu.bg - Homepage
Title
Cited by
Cited by
Year
A taxonomy of the cyber attacks
PK Boyanov
SCIENTIFIC AND APPLIED RESEARCH 3 (20), 3, 2013
62013
Educational simulation the local area network of academic departments with securely configured FTP server
P Boyanov, H Hristov, O Fetfov, T Trifonov
SocioBrains-International scientific refereed online journal with impact factor, 2017
42017
Equipment for evaluation of the characteristics of electronic-optic converters
P Getsov, W Bo, G Mardirossian, R Nedkov, S Stoyanov, O Prokopenko, ...
Comptes rendus de l’Académie bulgare des Sciences 70 (11), 2017
42017
Visual Detection of Distant Objects Using Electronic Optical Devices at Irregular Background Luminance
P Getzov, S Stoyanov, A Antonov, P Boyanov
Association Scientific and Applied Research 10, 5, 2016
32016
An architecture of staganological subsystem for information protection
S Zhelezov, H Paraskevov, H Hristov, P Boyanov, B Uzunova-Dimitrova
Proceedings of ICBBM 10, 123-128, 2014
32014
EDUCATIONAL EXPLOITING THE INFORMATION RESOURCES AND INVADING THE SECURITY MECHANISMS OF THE OPERATING SYSTEM WINDOWS 7 WITH THE EXPLOIT ETERNALBLUE AND BACKDOOR DOUBLEPULSAR
P Boyanov
Association Scientific and Applied Research 14, 34, 2018
22018
RESEARCH OF THE TRANSPARENCY CHARACTERISTICS OF THE ATMOSPHERE WHICH INFLUENCE THE FLIGHT CONTROL OF FLYING MACHINES.
P Getzov, S Stoyanov, P Boyanov
Journal Scientific & Applied Research 11, 2017
22017
Using HTTP filter to analyze and monitor the vulnerability and security states in determined computer network
P Boyanov
Journal Science Education Innovation 2, 45-51, 2014
22014
METHOD FOR IDENTIFICATION OF SIGNALS.
Z Zhekov, A Antonov, P Boyanov, D Chervenkov, T Trifonov
Journal Scientific & Applied Research 5, 2014
22014
Converting the learning process in educational research work of the students
S Stoyanov, P Boyanov
ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH 1, 19, 2013
22013
IMPLEMENTATION OF CREDENTIAL HARVESTER ATTACK METHOD IN THE COMPUTER NETWORK AND SYSTEMS
PK Boyanov, ZN Savova
International Scientific Conference" Defense Technologies", Faculty of …, 2019
12019
IMPLEMENTATION OF THE NETWORK VULNERABILITY SCANNER ARMITAGE FOR SECURITY WEAKNESSES DETECTION IN THE COMPUTER NETWORK AND SYSTEMS.
PK Boyanov
Journal Scientific & Applied Research 15, 2019
12019
ROUTING INFORMATION SECURITY IN THE LOCAL AREA NETWORK OF ACADEMIC DEPARTMENTS USING AN ENHANCED DISTANCE VECTOR ROUTING PROTOCOL-EIGRP.
P Boyanov, S Stoyanov, H Hristov, O Fetfov, T Trifonov
Journal Scientific & Applied Research 11, 2017
12017
Анализ на информационните ресурси в системата на логистичния мениджмънт
Р Коджейков, Ж Жеков, П Боянов
СБОРНИК, 191, 2015
12015
Анализ на особеностите на информационните логистични системи
Ж Жеков, П Боянов, Д Червенков
СБОРНИК, 208, 2015
12015
DESIGNING A SMALL CORPORATE BUILDING WITH FOUR WORKING COMPUTER DEPARTMENTS USING DISTANCE VECTOR ROUTING PROTOCOL-RIP
P Boyanov
Association Scientific and Applied Research 7, 52, 2015
12015
Analysis and assessment the security vulnerability in communication processes in a given computer network
PK Boyanov
ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH 2, 39, 2014
12014
VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS.
P Boyanov
Journal Scientific & Applied Research 5, 2014
12014
USING THE COLASOFT CAPSA NETWORK ANALYZER TO DIAGNOSE, PINPOINT AND DETECT A VIRIETY OF MALICIOUS CYBERATTACKS AND TO IMPROVE THE VULNERABILITIES FOR A SOHO NETWORK.
P Boyanov
Journal Scientific & Applied Research 5, 2014
12014
USING THE SECURITY NETWORK SCANNER GFI LANGUARD TO DISCOVER AND IMPROVE THE VULNERABILITIES IN THE COMPUTER NETWORK SYSTEMS.
P Boyanov
Journal Scientific & Applied Research 4, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–20