Boyan Jekov | State University of Library Studies and IT, Sofia (original) (raw)
Papers by Boyan Jekov
Communications in computer and information science, Oct 31, 2023
Coronavirus pandemic presented cybercriminals with new opportunities as most of the institutions ... more Coronavirus pandemic presented cybercriminals with new opportunities as most of the institutions switched to teleworking. The rapid transition online leaves information systems and networks in current configurations without cybersecurity. This leads to organizational and technological changes in cybersecurity policy. The problems that arise under these conditions need to be addressed, taking into account both regulatory requirements and existing cybersecurity frameworks. Staff and learners have access to the information systems remotely. To do this, they use devices and data outside the institution. This imposes new cybersecurity requirements and measures. The goal of the study is to systematize the changes in cyber protection needed for migrating to distance working in a situation of a pandemic. The methodology is based on concepts and standards for change management. The results are a meta-level matrix sintezised the problematic clusters concerning changes for IT services in the situation of pandemic, general conclusions and a recommendations about the introduction of changes in cybersecurity policies. The presented recommendations are based on updating the risk assessment and the priorities of critical assets. Extraordinary problems caused by dark data and shadow IT are also presented. It can serve to reduce the impact on the attack surface of information systems and applications for remote working.
Nucleation and Atmospheric Aerosols, 2017
The last decade together with rapidly developing of Information and Communication Technologies da... more The last decade together with rapidly developing of Information and Communication Technologies data and its variety of application fields gaining in popularity. Initially the data becomes Big. Everyday accumulation of so big amount of data and the possibility to analyze it contributes to the ease of modern life. The curiosity of the world enforces the Big Data to become Open and then to connect the available open data in linked. This article presents the Open data and their implication in different fields. Detailed is examined the quality of Open data as the methodology for its evaluation is presented. Representation / representative Representative dimensions capture aspects related to data design, such as brevity, consistency, comprehensibility and interoperability. Тhe brevity refers to data representation in compact, well-formatted form, clear and complete. Consistency is the information structure and form degree which require to a pre-return information. As the linked data include data aggregation of multiple sources, it allows the definition expansion, which implies not only compatibility with previous data but also other sources data. Comprehensibility refers to the data clearly 020078-5 understanding ease. Interoperability refers to data technical aspects and if the presented information uses appropriate tools to meet the user technical capabilities.
2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Nov 16, 2022
Information & Security, 2020
LPWAN (Low-power Wide-area network) networks are well-known since the 1980s, but due to low effic... more LPWAN (Low-power Wide-area network) networks are well-known since the 1980s, but due to low efficiency were not in active use for a long time. Modern LPWAN is a game-changing technology with true power in network coverage, cost efficiency, and low operational expenses. LPWAN services' most frequent market is in smart cities, agriculture, healthcare, and civil defence systems. LoRa is considered one of the market leaders in LPWAN; however, the low bandwidth of its physical layer makes it unsuitable for high-speed transmission. The provision of integrity, availability, and confidentiality in IoT networks is still of major concern. Data accuracy and lack of control over the transmission of personal information prevents the active use of the technology in regulated industries, such as healthcare and civil defence. In this article, we adopt LoRa for the transmission of media content, with an ability to regulate the quality of data and achieve desired level of integrity and availability. This allows the system to self-configure (train) via more reliable machine learning techniques.
2023 8th International Conference on Smart and Sustainable Technologies (SpliTech)
2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)
International Journal of Advances in Intelligent Informatics
The paper presents a brief analysis of publications utilizing the public SARS-CoV-2 dataset, cons... more The paper presents a brief analysis of publications utilizing the public SARS-CoV-2 dataset, consisting of patients’ computer tomography scans captured from Brazil hospitals and an experimental setup addressing the found data challenges. The analysis shows that all protocols, with one exception, suffer from data leakage arising from data organization where the patients and their images are not grouped. Each patient is represented with several scans. It can provide misleading results as data of the same individual may occur in both training and test sets. Furthermore, only one paper proposed ensemble learning utilizing as base models VGG-16, ResNet50, and Xception. Therefore, we proposed and experimented with the following strategy to mitigate the found risks of bias: data standardization and normalization to achieve proper contrast and resolution; k-means and group shuffle split to avoid data leakage; augmentation and ensemble transfer learning to deal with limited sample size and o...
2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)
International journal of computers, Mar 8, 2017
The Open Data goal is similar to the other open data movements-Open Sources, Open Access etc. Alt... more The Open Data goal is similar to the other open data movements-Open Sources, Open Access etc. Although the Open Data philosophy is defined long time ago, the term gains popularity with the Internet and World Wide Web-WWW rise and mostly with the Open Data initiatives Data.gov and Data.gov.uk. The curiosity of the world enforces the Big Data to become Open and then to connect the available open data in linked. In this article is presented a comprehensive review of established methodologies for assess the data quality. It is proposed a multistep integrated approach for quality assessment of Open data as the methodology for its evaluation.
2021 IEEE 62nd International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON), 2021
Coronavirus pandemic presented cybercriminals with new opportunities as most of the institutions ... more Coronavirus pandemic presented cybercriminals with new opportunities as most of the institutions switched to teleworking. The rapid transition online leaves information systems and networks in current configurations without cybersecurity. This leads to organizational and technological changes in cybersecurity policy. The problems that arise under these conditions need to be addressed, taking into account both regulatory requirements and existing cybersecurity frameworks. Staff and learners have access to the information systems remotely. To do this, they use devices and data outside the institution. This imposes new cybersecurity requirements and measures. The goal of the study is to systematize the changes in cyber protection needed for migrating to distance working in a situation of a pandemic. The methodology is based on concepts and standards for change management. The results are a meta-level matrix sintezised the problematic clusters concerning changes for IT services in the situation of pandemic, general conclusions and a recommendations about the introduction of changes in cybersecurity policies. The presented recommendations are based on updating the risk assessment and the priorities of critical assets. Extraordinary problems caused by dark data and shadow IT are also presented. It can serve to reduce the impact on the attack surface of information systems and applications for remote working.
2021 29th National Conference with International Participation (TELECOM), 2021
The analysis of big data has an advantage among the telecommunications companies which aim is to ... more The analysis of big data has an advantage among the telecommunications companies which aim is to improve their performance. Identifying most common benefits and challenges related to the usage of big data, reveals top impact factors that might influence on the technology adoption of data analysis in the organizations. In parallel, the current review offers both practitioners and scholars an increased understanding of the correlation between big data analytics (BDA) and overall company performance in Telecom industry.
ICERI2018 Proceedings, 2018
Software Engineering and Algorithms, 2021
EDULEARN20 Proceedings, 2020
INTED2021 Proceedings, 2021
2020 28th National Conference with International Participation (TELECOM), 2020
Network operators in Telecommunication Industry stand to gain with the newest innovations of proc... more Network operators in Telecommunication Industry stand to gain with the newest innovations of process automatic solutions as decreasing the necessity for their employees to perform repetitive processes and leading to improved productivity and effectiveness. Robotic process solutions in telecom helps to minimize manual mistakes and improve turnaround times in processes such as invoice preparation, billing, and document verification which are repetitive in general. Startups and emerging companies evolve Robotic Process Automation (RPA) to upgrade overall profitability, customer satisfaction and retention.
Communications in computer and information science, Oct 31, 2023
Coronavirus pandemic presented cybercriminals with new opportunities as most of the institutions ... more Coronavirus pandemic presented cybercriminals with new opportunities as most of the institutions switched to teleworking. The rapid transition online leaves information systems and networks in current configurations without cybersecurity. This leads to organizational and technological changes in cybersecurity policy. The problems that arise under these conditions need to be addressed, taking into account both regulatory requirements and existing cybersecurity frameworks. Staff and learners have access to the information systems remotely. To do this, they use devices and data outside the institution. This imposes new cybersecurity requirements and measures. The goal of the study is to systematize the changes in cyber protection needed for migrating to distance working in a situation of a pandemic. The methodology is based on concepts and standards for change management. The results are a meta-level matrix sintezised the problematic clusters concerning changes for IT services in the situation of pandemic, general conclusions and a recommendations about the introduction of changes in cybersecurity policies. The presented recommendations are based on updating the risk assessment and the priorities of critical assets. Extraordinary problems caused by dark data and shadow IT are also presented. It can serve to reduce the impact on the attack surface of information systems and applications for remote working.
Nucleation and Atmospheric Aerosols, 2017
The last decade together with rapidly developing of Information and Communication Technologies da... more The last decade together with rapidly developing of Information and Communication Technologies data and its variety of application fields gaining in popularity. Initially the data becomes Big. Everyday accumulation of so big amount of data and the possibility to analyze it contributes to the ease of modern life. The curiosity of the world enforces the Big Data to become Open and then to connect the available open data in linked. This article presents the Open data and their implication in different fields. Detailed is examined the quality of Open data as the methodology for its evaluation is presented. Representation / representative Representative dimensions capture aspects related to data design, such as brevity, consistency, comprehensibility and interoperability. Тhe brevity refers to data representation in compact, well-formatted form, clear and complete. Consistency is the information structure and form degree which require to a pre-return information. As the linked data include data aggregation of multiple sources, it allows the definition expansion, which implies not only compatibility with previous data but also other sources data. Comprehensibility refers to the data clearly 020078-5 understanding ease. Interoperability refers to data technical aspects and if the presented information uses appropriate tools to meet the user technical capabilities.
2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Nov 16, 2022
Information & Security, 2020
LPWAN (Low-power Wide-area network) networks are well-known since the 1980s, but due to low effic... more LPWAN (Low-power Wide-area network) networks are well-known since the 1980s, but due to low efficiency were not in active use for a long time. Modern LPWAN is a game-changing technology with true power in network coverage, cost efficiency, and low operational expenses. LPWAN services' most frequent market is in smart cities, agriculture, healthcare, and civil defence systems. LoRa is considered one of the market leaders in LPWAN; however, the low bandwidth of its physical layer makes it unsuitable for high-speed transmission. The provision of integrity, availability, and confidentiality in IoT networks is still of major concern. Data accuracy and lack of control over the transmission of personal information prevents the active use of the technology in regulated industries, such as healthcare and civil defence. In this article, we adopt LoRa for the transmission of media content, with an ability to regulate the quality of data and achieve desired level of integrity and availability. This allows the system to self-configure (train) via more reliable machine learning techniques.
2023 8th International Conference on Smart and Sustainable Technologies (SpliTech)
2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)
International Journal of Advances in Intelligent Informatics
The paper presents a brief analysis of publications utilizing the public SARS-CoV-2 dataset, cons... more The paper presents a brief analysis of publications utilizing the public SARS-CoV-2 dataset, consisting of patients’ computer tomography scans captured from Brazil hospitals and an experimental setup addressing the found data challenges. The analysis shows that all protocols, with one exception, suffer from data leakage arising from data organization where the patients and their images are not grouped. Each patient is represented with several scans. It can provide misleading results as data of the same individual may occur in both training and test sets. Furthermore, only one paper proposed ensemble learning utilizing as base models VGG-16, ResNet50, and Xception. Therefore, we proposed and experimented with the following strategy to mitigate the found risks of bias: data standardization and normalization to achieve proper contrast and resolution; k-means and group shuffle split to avoid data leakage; augmentation and ensemble transfer learning to deal with limited sample size and o...
2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)
International journal of computers, Mar 8, 2017
The Open Data goal is similar to the other open data movements-Open Sources, Open Access etc. Alt... more The Open Data goal is similar to the other open data movements-Open Sources, Open Access etc. Although the Open Data philosophy is defined long time ago, the term gains popularity with the Internet and World Wide Web-WWW rise and mostly with the Open Data initiatives Data.gov and Data.gov.uk. The curiosity of the world enforces the Big Data to become Open and then to connect the available open data in linked. In this article is presented a comprehensive review of established methodologies for assess the data quality. It is proposed a multistep integrated approach for quality assessment of Open data as the methodology for its evaluation.
2021 IEEE 62nd International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON), 2021
Coronavirus pandemic presented cybercriminals with new opportunities as most of the institutions ... more Coronavirus pandemic presented cybercriminals with new opportunities as most of the institutions switched to teleworking. The rapid transition online leaves information systems and networks in current configurations without cybersecurity. This leads to organizational and technological changes in cybersecurity policy. The problems that arise under these conditions need to be addressed, taking into account both regulatory requirements and existing cybersecurity frameworks. Staff and learners have access to the information systems remotely. To do this, they use devices and data outside the institution. This imposes new cybersecurity requirements and measures. The goal of the study is to systematize the changes in cyber protection needed for migrating to distance working in a situation of a pandemic. The methodology is based on concepts and standards for change management. The results are a meta-level matrix sintezised the problematic clusters concerning changes for IT services in the situation of pandemic, general conclusions and a recommendations about the introduction of changes in cybersecurity policies. The presented recommendations are based on updating the risk assessment and the priorities of critical assets. Extraordinary problems caused by dark data and shadow IT are also presented. It can serve to reduce the impact on the attack surface of information systems and applications for remote working.
2021 29th National Conference with International Participation (TELECOM), 2021
The analysis of big data has an advantage among the telecommunications companies which aim is to ... more The analysis of big data has an advantage among the telecommunications companies which aim is to improve their performance. Identifying most common benefits and challenges related to the usage of big data, reveals top impact factors that might influence on the technology adoption of data analysis in the organizations. In parallel, the current review offers both practitioners and scholars an increased understanding of the correlation between big data analytics (BDA) and overall company performance in Telecom industry.
ICERI2018 Proceedings, 2018
Software Engineering and Algorithms, 2021
EDULEARN20 Proceedings, 2020
INTED2021 Proceedings, 2021
2020 28th National Conference with International Participation (TELECOM), 2020
Network operators in Telecommunication Industry stand to gain with the newest innovations of proc... more Network operators in Telecommunication Industry stand to gain with the newest innovations of process automatic solutions as decreasing the necessity for their employees to perform repetitive processes and leading to improved productivity and effectiveness. Robotic process solutions in telecom helps to minimize manual mistakes and improve turnaround times in processes such as invoice preparation, billing, and document verification which are repetitive in general. Startups and emerging companies evolve Robotic Process Automation (RPA) to upgrade overall profitability, customer satisfaction and retention.