Open Access

Multiple Human Biometrics Fusion in Support of Cyberthreats Identification


Cite

1. Wrightson, T. Advanced Persistent Threat Hacking. McGraw-Hill Education, 2015. 434 p.Search in Google Scholar

2. 2015 Data Breach Investigation Report, Verizon. http://www.verizonenterprise.com/DBIR/2015/Search in Google Scholar

3. A. Kayem, C. Meinel, Eds. Information Security in Diverse Computing Environments, AISPE Book Series, IGI Global, 2014. 354 p.10.4018/978-1-4666-6158-5Search in Google Scholar

4. Nguye, M-T., M. Dun. Some Methods for Scenario Analysis in Defence Strategic Planning. Australian DoD, Joint Operations Division, Defence Science and Technology Organisation, DSTO-TR-2242, 2009. http://goo.gl/f4vkktSearch in Google Scholar

5. Minchev, Z. Human Factor Role for Cyber Threats Resilience. – In: Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare. Chapter 17. IGI Global. 2016. 583 p. (in Press).10.4018/978-1-4666-8793-6.ch017Search in Google Scholar

6. Peper, E. Support Healthy Brain Development: Implications for Attention Deficit/Hyperactivity Disorder. – Psychophysiology Today, Vol. 9, 2014, No 1, pp. 4-15.10.1017/CBO9781139035491.002Search in Google Scholar

7. Swingle, M. i-Minds: How Cell Phones, Computers, Gaming, and Social Media Are Changing Our Brains, Our Behavior, and the Evolution of Our Species. Inkwater Press, 2015. 268 p.Search in Google Scholar

8. J. Armstrong, Ed. Selecting Forecasting Methods. – In: Principles of Forecasting. Handbook for Researchers and Practitioners. Kluwer Academic Publishers, 2001. 849 p.10.1007/978-0-306-47630-3Search in Google Scholar

9. Gardiner, G. Stochastic Methods: Handbook for the Natural and Social Sciences. Springer, 2009. 447 p.Search in Google Scholar

10. Morrison, F. The Art of Modeling Dynamic Systems: Forecasting for Chaos, Randomness and Determinism. Dover Publications, 2008. 414 p.Search in Google Scholar

11. Moreno, D. Selecting Software Requirements Elicitation Techniques: A Contextual Framework. LAP LAMBERT Academic Publishing, 2011. 220 p.Search in Google Scholar

12. D. Balzarotti, E. Markatos, Eds. The Red Book – A Roadmap for Systems Security Research. SysSec Consortium, 2013. http://red-book.euSearch in Google Scholar

13. Balzarotti, D. Final Report on Threats on the Future Internet: A Research Outlook. SysSec Consortium, 30 September 2014. http://goo.gl/gQiCWVSearch in Google Scholar

14. Minchev, Z. Future Threats and Challenges in Cyberspace. CSDM Views, Centre for Security and Defence Management, Institute of ICT, Sofia, No 31, 2015. 6 p. http://it4sec.org/system/files/views_031.pdfSearch in Google Scholar

15. Minchev, Z., M. Petkova, Information Processes and Threats in Social Networks: A Case Study. – In: Proc. of Conjoint Scientific Seminar Modelling and Control of Information Processes, Sofia, College of Telecommunications & Post, 2010, pp. 85-93.Search in Google Scholar

16. Minchev, Z. Human Factor Dual Role in Modern Cyberspace Social Engineering. – In: Proc. of NATO ATC “Terrorist Use of Cyberspace”, Ohrid, Macedonia, 8-12 December 2014, Published in: Series NATO Science for Peace and Security Series D: Information and Communication Security Ebook, Vol. 42, Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, 17 September 2015, pp. 116-128.Search in Google Scholar

17. Boyanov, L., Z. Minchev. Cyber Security Challenges in Smart Homes. – Cyber Security and Resiliency Policy Framework, NATO Science for Peace and Security Series. D: Information and Communication Security. Vol. 38. Amsterdam, The Netherlands, IOS Press, 2014, pp. 99-114.Search in Google Scholar

18. Minchev, Z. Cyber Threats in Social Networks and Users’ Response Dynamics. Institute of ICT, IT4SEC Reports, No 105, 2012. http://dx.doi.org/10.11610/it4sec.010510.11610/it4sec.0105Search in Google Scholar

19. Shalamanov, V. Computer Assisted Exercise Environment for Terrorist Attack Consequence Management. – In: Proc. of RTO-MP-MSG-045 Meeting Proceedings, Rome, Italy, 4-7 October 2006, pp. 22-1-22-18.Search in Google Scholar

20. Minchev, Z. Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks. – In: Proc. of NATO ARW “Encouraging Cyber Defence Awareness in the Balkans”, Skopje, 17-19 March 2015 (in Press).Search in Google Scholar

21. Brain Waves Module 2: Neuroscience: Implications for Education and Lifelong Learning. The Royal Society, 2011. https://goo.gl/j32krtSearch in Google Scholar

22. Minchev, Z., E. Kelevedjiev, P. Gatev. Audio-Visual Entrainment Influence on Postural Dynamics. – In: Proc. of International Workshop “Posture, Balance and the Brain”, Tessaloniki, Greece, 13 September 2014, Published 24 May 2015, pp. 55-60.10.11610/posture.08Search in Google Scholar

23. Minchev, Z., P. Gatev. Psychophysiological Evaluation of Emotions due to the Communication in Social Networks. – Scripta Scientifica Medica, Vol. 44, 2012, No 1, Supplement 1, pp. 125-128.Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology