Autors: Tsochev, G. R., Stankov, I. S.
Title: Vulnerability and Protection of Business Management Systems: Threats and Challenges
Keywords: vulnerability, busmen management systems, threats, enterpris

References

    Issue

    PROBLEMS OF ENGINEERING CYBERNETICS AND ROBOTICS, 2020, Bulgaria, ISSN 0204-9848

    Цитирания (Citation/s):
    1. Fog Oriented Model for Data Collection in the Networks of Mobile Devices - 2020 - в издания, индексирани в Scopus или Web of Science
    2. V. D. Dimitrov, "Implementation of Loop Prevention Protocols at the Data Link Layer in LAN," 2020 28th National Conference with International Participation (TELECOM), Sofia, 2020, pp. 105-108, doi: 10.1109/TELECOM50385.2020.9299530. - 2020 - в издания, индексирани в Scopus или Web of Science
    3. Torregosa, Jurly & Orong, Markdy & Ricalde, Gretel & Amin, Warnner & Lonzon, Herwina & Alcontin, Richel. (2021). Assessing the Conformity Level of Information Security Management System of the Higher Education Institutions: Basis for the Development of Policies and Guidelines. Mediterranean Journal of Basic and Applied Sciences. 05. 57-71. 10.46382/MJBAS.2021.5105. - 2021 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    4. Zhong, X., Si, M., & Shanthini, A. (2021). E-business Transformation for Organizational Management and Its Impact in the Online Market. Journal of Multiple-Valued Logic & Soft Computing, 36. - 2021 - в издания, индексирани в Scopus или Web of Science
    5. Tianxing, M., Yoshinov, R., Osipov, V., Zhukova, N., Schukina, M., & Evnevich, E. Problems of Human Secure Interaction with the Internet Space. - 2021 - в български издания
    6. BABA, S. A. RISK-TAKING AND RESILIENCE OF FOOD AND BEVERAGE MANUFACTURING FIRMS IN SOUTH-SOUTH NIGERIA. Research Journal of Management Practice| ISSN, 2782, 7674. - 2021 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    7. Syed, N. F., Shah, S. W., Trujillo-Rasua, R., & Doss, R. (2022). Traceability in supply chains: A Cyber security analysis. Computers & Security, 112, 102536. - 2021 - в издания, индексирани в Scopus или Web of Science
    8. Chang, V., Golightly, L., Xu, Q. A., Boonmee, T., & Liu, B. S. (2023). Cybersecurity for children: an investigation into the application of social media. Enterprise Information Systems, 2188122. - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    9. Al-Alawi, A. I., Alsaad, A. J., AlAlawi, E. I., & Al-Hadad, A. A. N. (2021, December). The Analysis of Human Attitude toward Cybersecurity Information Sharing. In 2021 International Conference on Decision Aid Sciences and Application (DASA) (pp. 947-956). IEEE. - 2021 - в издания, индексирани в Scopus или Web of Science
    10. Liveretos, A., & Draganov, I. (2022). Customer Identity and Access Management (CIAM): An overview of the main technology vendors. International Journal of Economics and Management Systems, 7. - 2022 - в издания, индексирани в Scopus или Web of Science
    11. Borissova, Daniela, et al. "Group Decision-Making Models for Selection of Virtual Machine Software for Malware Detection Purposes." 2023 12th Mediterranean Conference on Embedded Computing (MECO). IEEE, 2023. - 2023 - в издания, индексирани в Scopus или Web of Science
    12. Oetama, Raymond, and Mayang Andila. "Training Recommendation using Simple Addictive Weighting in Agriculture Product Trading Company." International Journal of Science, Technology & Management 4.3 (2023): 589-597. - 2023 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science

    Вид: статия в списание, публикация в реферирано издание, индексирана в Google Scholar