Linko Nikolov

Linko Nikolov
Verified
Linko verified their affiliation via an institutional email.
Verified
Linko verified their affiliation via an institutional email.
  • Doctor of Engineering
  • Head of Department at Vasil Levski National Military University

About

30
Publications
14,558
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
61
Citations
Introduction
Current interests: Computer Network Management; Network and Computer Systems Security. Research methods: PenTesting OS Kali Linux in a Lab Network. We are working still on previous known attacks to see how they are emitted and what impact they have on a LAN network.
Current institution
Vasil Levski National Military University
Current position
  • Head of Department
Education
January 2013 - December 2016
Defense Institute Sofia
Field of study
  • ICTs
July 2003 - October 2008

Publications

Publications (30)
Conference Paper
Full-text available
The European Union Erasmus+ program offers the opportunity to create and evolve strategic partnerships among European institutions. By KeyAction02 projects, collaboration over different topics is available. Such project is the ongoing DIMAS, which aims to improve the teaching and learning process of Defence and Security higher education Mathematics...
Conference Paper
Full-text available
The social engineering cyberattacks are the "hidden" initial step to destroy an infrastructure. Only by means of lie, users get tricked and all cybersecurity precautions can be overwhelmed by the hackers. In this research paper examples of social engineering e-mail letters are analyzed in the means of specific suspicious cyber activities. Specializ...
Conference Paper
Full-text available
Math teaching and learning finds difficulties nowadays, having technologies evolved and easiness of information access. Specific explanation where Math should be applied lays the foundation to Math interest return and increase. This research paper presents several Math-based scenarios in subjects of Defence and Security education. Introduction The...
Conference Paper
Full-text available
Email social engineering is the most used path towards cribercrime nowadays. In this research paper, examples of social engineering e-mail letters are presented in the means of specific parameters such as sender, topics, text, internal email content and attractive emotiocons. A classification is proposed, which can be used as further enterprise per...
Conference Paper
Full-text available
CIS support is one of the most significant batlefield operations in contemporary warfare. Information systems availability help comannder's decision making process faster and valuable. In this research paper network infrastructure is presented and network traffic is analyzed in the means of load, datarates and cybersecurity aspect. Specialized pack...
Conference Paper
Full-text available
Network services support is one of the most significant batlefield IT operations in contemporary warfare. Information services availability help comannder's decision making process faster and valuable. In this research paper network services building is presented and analyzed in the means of availability, load, usefulness and cybersecurity aspect....
Conference Paper
Full-text available
In a contemporary battlefield operations, cybersecurity has found an essential role. Having IT support as one of the significant operations in contemporary warfare, hacker attacks seem inevitable. Computer systems availability help comannder's decision making process fast and valuable, but blocking it may result devastating. In this research paper...
Article
Full-text available
To date, artificial intelligence systems are predicted to rapidly enter the defense and security sector. The importance of such automation systems is still under research, in order the qualitative and qualitative indicators for decision making to be improved. In such researches, real-time data analysis tools have to be used and their data exchanged...
Conference Paper
Full-text available
E-learning platforms trend to increase their impact across educational institutions. On one hand, it appears as an improvement and evolution of educational process. But on the other hand, as an online service, the cybersecurity risk is imposed. Lots of vulnerabilities may be found while performing online education. This research paper proposes nece...
Conference Paper
Full-text available
In this paper the achieved result from 3 "Erasmus+" KA02 projects are given. The main idea of the projects is to support digitalization in higher education especially in military area, also to create a common modules and common semesters for study abroad in EU countries.
Conference Paper
Full-text available
COVID-19 hastened a trend that was already ongoing before the pandemic outbreak: the progressively increasing use of distance and online teaching and learning, alongside with lectures and classes. The potentialities of online teaching allowed a didactic continuity that would have been impossible otherwise, and this approach is likely to be maintain...
Conference Paper
Full-text available
Nowadays with the advancement of technologies and the direct impact of Covid-19 on business processes, more and more services are provided to the end users electronically. This is a convenient method for both providers of these services and consumers, but this trend also leads to several vulnerabilities in the protection of computer server systems...
Book
Full-text available
Main steps for Communication and Information systems penetration testing and the respective results.
Conference Paper
Full-text available
Communication over the public network infrastructure like Internet brings potential threat for the means of social engineering email letters. Recognition of such letters seems to be a problem to workers. Some malware analysis of such example scam letters is made in this research paper. Impact on computer or network systems is presented.
Article
Full-text available
Cybersecurity became the most famous topic concerning security development. Having social engineering in mind, all technical devices can be beaten and a cyberattack can have success just having incompetent personnel employed. In this research paper, some real social engineering texts as e-mails are shown and malicious intends presented. Short analy...
Article
Full-text available
The future of Internet communications is trending at Internet-of-Things (IoT) and furthermore: Internet-of-Everything (IoE) with Wireless networks deployed. But most important in the development of wireless networking is the security issue. Computer and networking security will be the great wall built over systems and networks. In this scientific r...
Conference Paper
Full-text available
JavaScript is the most used tool for web developers in the goal of achieving liveliness of web-pages as well as usefulness and flexibility. On one hand, it is user friendly and is well accepted for interactive customers. On the other hand JavaScript hides vulnerabilities and backdoor threats. Developing JS code should be security aware and classifi...
Article
Full-text available
Applications and protocols, serving trillions of devices worldwide, have weak points and vulnerabilities. Malicious intends of hackers exploit those vulnerabilities, which can lead to information leakage, network and systems malfunction and even serious money loss. Before giving birth to an app, service or network resource facing internet, serious...
Conference Paper
Full-text available
В този обзорен доклад са разгледани основните принципи и методи за осигуряване на кибер сигурност. Дефинирани са и ориентировъчни понятия за направлението Киберсигурност, като се посочват същността, ролята, мястото и задачите, изпълнявани в процеса на осигуряване на защита на електронната информация в компютърните системи и мрежи.
Conference Paper
Full-text available
Cyber security is one of the most commented areas in IT nowadays. The increasing role of Internet, connected devices (IoT) and e-commerce has defined strict review of security policies and electronic defense activities. Ransomware, SQLi and DDoS are widespread attacks against European companies. New European cybersecurity policy was issued in respo...
Article
Full-text available
Cybersecurity is one of the most commented areas in IT nowadays. Plenty of network and application attacks are possessed worldwide. Security becomes serious issue for corporations and governmental computer networks as functionality of applications rises in technological aspect. Most affective and widely used network attacks and application vulnerab...
Article
Full-text available
Cellular systems are trending in a manner of increasing the data rates and coverage. Despite evolution to new generation networks (NGN), 3rd generation systems (3G) are widely deployed and still in use. Bit error rate (BER) against signal-to-noise ratio (SNR) defines the quality of the link. BER performance in a jammed radio environment is studied...
Article
Full-text available
This article offers a neural network architecture for automatic classification of Inverse Synthetic Aperture Radar objects represented in images with high level of optimization. A full explanation of the procedures of two-layer neural network architecture creating and training is described. The neural network is experimentally simulated in MATLAB e...
Conference Paper
Full-text available
Modern communication systems use quadrature or phase modulations for data transfer. Imposed noise processes and conducted interference in the channel destroy the transmitted signal. In this paper the author observes the resistance of a channel link with QPSK for wideband (5MHz) data signal. Variations in transmit level are made in order to change t...
Conference Paper
Full-text available
Security layer in CDMA2000 is utilized to provide private data processing in the multiple access environment. The Diffie-Helman algorithm and Advanced Encryption Standard (AES) are applied, but cryptographic security is hardly to be assumed. The complexity of the algorithms is presented in this paper and some further details about data transfer are...
Article
Full-text available
Cellular radio communications operate in a severe radio environment. Multipath propagation, inter-channel, inter-symbol and Multiple Access interference, frequency selective fading and many others, contribute to system performance degradation. Contemporary techniques, such as zero-forcing equalization and sophisticated signal filtering, are used fo...
Article
Full-text available
The main challenge in the evolution of cellular networks is providing increased channel capacity and data rates. Mobile operators are obligatory to boost the researching of methods for enhancing the spectral efficiency in response to the growing needs for better connectivity and signal coverage. The engineering of transmitters and receivers should...
Conference Paper
Full-text available
An essential integration features in Fixed Mobile Convergence are discussed in this paper. The growing user requirements for consistent set of services and facilities are the main reason for the evolution of mobile networks nowadays. Convergence with fixed IP networks is the destination field to respond employees’ and customers’ needs. An overview...
Conference Paper
Full-text available
Contemporary Internet sites apply many additional functions while processing web requests and responds. Different functions are in use to get the specific site more attractive to the audience. Easy browsing is one of the aspects for quality Internet page. To make the number of functions available and to keep previously stored information, a special...

Network

Cited By