[1. Wrightson, T. Advanced Persistent Threat Hacking. McGraw-Hill Education, 2015. 434 p.]Search in Google Scholar
[2. 2015 Data Breach Investigation Report, Verizon. http://www.verizonenterprise.com/DBIR/2015/]Search in Google Scholar
[3. A. Kayem, C. Meinel, Eds. Information Security in Diverse Computing Environments, AISPE Book Series, IGI Global, 2014. 354 p.10.4018/978-1-4666-6158-5]Search in Google Scholar
[4. Nguye, M-T., M. Dun. Some Methods for Scenario Analysis in Defence Strategic Planning. Australian DoD, Joint Operations Division, Defence Science and Technology Organisation, DSTO-TR-2242, 2009. http://goo.gl/f4vkkt]Search in Google Scholar
[5. Minchev, Z. Human Factor Role for Cyber Threats Resilience. – In: Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare. Chapter 17. IGI Global. 2016. 583 p. (in Press).10.4018/978-1-4666-8793-6.ch017]Search in Google Scholar
[6. Peper, E. Support Healthy Brain Development: Implications for Attention Deficit/Hyperactivity Disorder. – Psychophysiology Today, Vol. 9, 2014, No 1, pp. 4-15.10.1017/CBO9781139035491.002]Search in Google Scholar
[7. Swingle, M. i-Minds: How Cell Phones, Computers, Gaming, and Social Media Are Changing Our Brains, Our Behavior, and the Evolution of Our Species. Inkwater Press, 2015. 268 p.]Search in Google Scholar
[8. J. Armstrong, Ed. Selecting Forecasting Methods. – In: Principles of Forecasting. Handbook for Researchers and Practitioners. Kluwer Academic Publishers, 2001. 849 p.10.1007/978-0-306-47630-3]Search in Google Scholar
[9. Gardiner, G. Stochastic Methods: Handbook for the Natural and Social Sciences. Springer, 2009. 447 p.]Search in Google Scholar
[10. Morrison, F. The Art of Modeling Dynamic Systems: Forecasting for Chaos, Randomness and Determinism. Dover Publications, 2008. 414 p.]Search in Google Scholar
[11. Moreno, D. Selecting Software Requirements Elicitation Techniques: A Contextual Framework. LAP LAMBERT Academic Publishing, 2011. 220 p.]Search in Google Scholar
[12. D. Balzarotti, E. Markatos, Eds. The Red Book – A Roadmap for Systems Security Research. SysSec Consortium, 2013. http://red-book.eu]Search in Google Scholar
[13. Balzarotti, D. Final Report on Threats on the Future Internet: A Research Outlook. SysSec Consortium, 30 September 2014. http://goo.gl/gQiCWV]Search in Google Scholar
[14. Minchev, Z. Future Threats and Challenges in Cyberspace. CSDM Views, Centre for Security and Defence Management, Institute of ICT, Sofia, No 31, 2015. 6 p. http://it4sec.org/system/files/views_031.pdf]Search in Google Scholar
[15. Minchev, Z., M. Petkova, Information Processes and Threats in Social Networks: A Case Study. – In: Proc. of Conjoint Scientific Seminar Modelling and Control of Information Processes, Sofia, College of Telecommunications & Post, 2010, pp. 85-93.]Search in Google Scholar
[16. Minchev, Z. Human Factor Dual Role in Modern Cyberspace Social Engineering. – In: Proc. of NATO ATC “Terrorist Use of Cyberspace”, Ohrid, Macedonia, 8-12 December 2014, Published in: Series NATO Science for Peace and Security Series D: Information and Communication Security Ebook, Vol. 42, Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, 17 September 2015, pp. 116-128.]Search in Google Scholar
[17. Boyanov, L., Z. Minchev. Cyber Security Challenges in Smart Homes. – Cyber Security and Resiliency Policy Framework, NATO Science for Peace and Security Series. D: Information and Communication Security. Vol. 38. Amsterdam, The Netherlands, IOS Press, 2014, pp. 99-114.]Search in Google Scholar
[18. Minchev, Z. Cyber Threats in Social Networks and Users’ Response Dynamics. Institute of ICT, IT4SEC Reports, No 105, 2012. http://dx.doi.org/10.11610/it4sec.010510.11610/it4sec.0105]Search in Google Scholar
[19. Shalamanov, V. Computer Assisted Exercise Environment for Terrorist Attack Consequence Management. – In: Proc. of RTO-MP-MSG-045 Meeting Proceedings, Rome, Italy, 4-7 October 2006, pp. 22-1-22-18.]Search in Google Scholar
[20. Minchev, Z. Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks. – In: Proc. of NATO ARW “Encouraging Cyber Defence Awareness in the Balkans”, Skopje, 17-19 March 2015 (in Press).]Search in Google Scholar
[21. Brain Waves Module 2: Neuroscience: Implications for Education and Lifelong Learning. The Royal Society, 2011. https://goo.gl/j32krt]Search in Google Scholar
[22. Minchev, Z., E. Kelevedjiev, P. Gatev. Audio-Visual Entrainment Influence on Postural Dynamics. – In: Proc. of International Workshop “Posture, Balance and the Brain”, Tessaloniki, Greece, 13 September 2014, Published 24 May 2015, pp. 55-60.10.11610/posture.08]Search in Google Scholar
[23. Minchev, Z., P. Gatev. Psychophysiological Evaluation of Emotions due to the Communication in Social Networks. – Scripta Scientifica Medica, Vol. 44, 2012, No 1, Supplement 1, pp. 125-128.]Search in Google Scholar