[PDF][PDF] Implementation of credential harvester attack method in the computer network and systems

PK Boyanov, ZN Savova - … ,” faculty of artillery, air defense and …, 2019 - researchgate.net
The cyberattacks cause the greatest damage to businesses, companies, organizations and
individuals through unauthorized intrusion into the resources of computer and network …

Malware in Social Engineering

LG Nikolov, RS Dimov, BN Zlatinov - Security & Future, 2020 - stumejournals.com
Internet connectivity became obligatory for the business processes in each organisation and
institution. Communication over the public network infrastructure like Internet brings potential …

[引用][C] POWER OF BLOCKCHAIN TECHNOLOGY: REDEFINING AND DEMOLISHING TRUST IN DIGITAL ECONOMY

EM Konstantinova, AS Bradvarov

[引用][C] SOCIAL NETWORKS AND DIGITAL SECURITY

MA Karadocheva, EM Konstantinova, AB Aleksandrova

[引用][C] INFLUENCE OF DIGITAL TECHNOLOGY ON E-LEARNING

[引用][C] THE INVISIBLE INTERNET AND CYBER SECURITY

EM Konstantinova, MA Karadocheva, TS Tsankov

[引用][C] A COMPARATIVE ANALYSIS OF DIGITAL SIGNATURE CRYPTOGRAPHIC SYSTEMS

AA Dimitrova