EDUCATIONAL EXPLOITING THE INFORMATION RESOURCES AND INVADING THE SECURITY MECHANISMS OF THE OPERATING SYSTEM WINDOWS 7 WITH THE EXPLOIT ETERNALBLUE AND BACKDOOR DOUBLEPULSAR … P Boyanov Journal scientific and applied research 14 (1), 34-41, 2018 | 13 | 2018 |
A taxonomy of the cyber attacks P Boyanov Journal scientific and applied research 3 (1), 114-124, 2013 | 10 | 2013 |
Educational simulation the local area network of academic departments with securely configured FTP server P Boyanov, H Hristov, O Fetfov, T Trifonov SocioBrains-International scientific refereed online journal with impact factor, 2017 | 8 | 2017 |
Equipment for evaluation of the characteristics of electronic-optic converters P Getsov, W Bo, G Mardirossian, R Nedkov, S Stoyanov, O Prokopenko, ... Comptes rendus de l’Académie bulgare des Sciences 70 (11), 2017 | 6 | 2017 |
Анализ на съвременните видове уязвимости и експлойти в компютърните мрежи и системи О Фетфов, П Боянов, Ж Ташева, Т Трифонов Annual of Konstantin Preslavsky University of Shumen, Университетско …, 2016 | 6 | 2016 |
Vulnerability penetration testing the computer and network resources of windows based operating systems, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA) P Boyanov ISSN, 2014 | 6 | 2014 |
ROUTING INFORMATION SECURITY IN THE LOCAL AREA NETWORK OF ACADEMIC DEPARTMENTS USING AN ENHANCED DISTANCE VECTOR ROUTING PROTOCOL-EIGRP: ROUTING INFORMATION SECURITY IN THE … P Boyanov, S Stoyanov, H Hristov, O Fetfov, T Trifonov Journal scientific and applied research 11 (1), 35-46, 2017 | 5 | 2017 |
SECURITY ROUTING SIMULATION THE LOCAL AREA NETWORK OF ACADEMIC DEPARTMENTS USING A LINK-STATE ROUTING PROTOCOL-OSPF: SECURITY ROUTING SIMULATION THE LOCAL AREA NETWORK OF … P Boyanov, S Stoyanov, H Hristov, O Fetfov, T Trifonov Journal scientific and applied research 11 (1), 47-58, 2017 | 5 | 2017 |
An architecture of staganological subsystem for information protection S Zhelezov, H Paraskevov, H Hristov, P Boyanov, B Uzunova-Dimitrova Proceedings of ICBBM 10, 123-128, 2014 | 5 | 2014 |
VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS: VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF … P Boyanov Journal scientific and applied research 5 (1), 85-92, 2014 | 5 | 2014 |
IMPLEMENTATION OF MODIFIED SCRIPT FOR LINUX BASED OPERATING SYSTEMS USING A LINEAR ALGORITHM FOR NETWORK PORT SCANNING: IMPLEMENTATION OF MODIFIED SCRIPT FOR LINUX BASED … P Boyanov Journal scientific and applied research 23 (1), 48-59, 2022 | 4 | 2022 |
VISUAL DETECTION OF DISTANT OBJECTS USING ELECTRONIC OPTICAL DEVICES AT IRREGULAR BACKGROUND LUMINANCE: VISUAL DETECTION OF DISTANT OBJECTS USING ELECTRONIC OPTICAL DEVICES AT … P Getzov, S Stoyanov, A Antonov, P Boyanov Journal scientific and applied research 10 (1), 5-10, 2016 | 3 | 2016 |
Using HTTP filter to analyze and monitor the vulnerability and security states in determined computer network P Boyanov Journal Science Education Innovation 2, 45-51, 2014 | 3 | 2014 |
USING THE COLASOFT CAPSA NETWORK ANALYZER TO DIAGNOSE, PINPOINT AND DETECT A VIRIETY OF MALICIOUS CYBERATTACKS AND TO IMPROVE THE VULNERABILITIES FOR A SOHO NETWORK: USING THE … P Boyanov Journal scientific and applied research 5 (1), 93-100, 2014 | 3 | 2014 |
USING THE SECURITY NETWORK SCANNER GFI LANGUARD TO DISCOVER AND IMPROVE THE VULNERABILITIES IN THE COMPUTER NETWORK SYSTEMS: USING THE SECURITY NETWORK SCANNER GFI LANGUARD TO … P Boyanov Journal scientific and applied research 4 (1), 74-79, 2013 | 3 | 2013 |
Implementation of credential harvester attack method in the computer network and systems PK Boyanov, ZN Savova International scientific conference “Defense technologies,” faculty of …, 2019 | 2 | 2019 |
IMPLEMENTATION OF THE WEB BASED PLATFORMS FOR COLLECTING AND FOOTPRINTING IP INFORMATION OF HOSTS IN THE COMPUTER NETWORK AND SYSTEMS: IMPLEMENTATION OF THE WEB BASED PLATFORMS … P Boyanov Journal scientific and applied research 16 (1), 42-49, 2019 | 2 | 2019 |
METHOD FOR IDENTIFICATION OF SIGNALS: METHOD FOR IDENTIFICATION OF SIGNALS Z Zhekov, A Antonov, P Boyanov, D Chervenkov, T Trifonov Journal scientific and applied research 5 (1), 108-112, 2014 | 2 | 2014 |
Converting the learning process in educational research work of the students S Stoyanov, P Boyanov ASSOCIATION SCIENTIFIC AND APPLIED RESEARCH 1, 19, 2013 | 2 | 2013 |
Requirements to the Personal Work Stations in the University's Computer Laboratories M Iliev, M Bedzheva, P Boyanov, B Bedzhev, T Tsankov 2019 29th Annual Conference of the European Association for Education in …, 2019 | 1 | 2019 |