Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Atanasov I."

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    CYBER-PHYSICAL SECURITY THROUGH FACIAL RECOGNITION AND SENSOR DATA ANALYSIS
    (2024-01-01) Atanasov I.; Pilev D.
    The digital age has brought tremendous opportunities for innovation and efficiency. However, it has also exposed businesses, governments, and individuals to a range of cyber threats, such as data breaches, network attacks, ransomware, malicious insiders, and identity theft. This requires the implementation of robust cybersecurity measures to safeguard sensitive information and ensure the uninterrupted operation of all critical IT systems. This paper aims to provide a facial recognition security system for cyber-physical security that incorporates a neural network and intelligent algorithms to assess the severity level of security breaches. The system also includes alarms with severity levels ranging from 1 (low severity) to 4 (critical), based on facial recognition and data from carbon dioxide and temperature sensors. In the event of a security breach, an incident response plan is presented. The proposed system is applicable to offices, workspaces, server rooms, data centers and other areas where information is stored, to enhance physical security and protect against cybersecurity threats.

UCTM copyright © 2002-2025

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback