Table of Contents

  • THEORETICAL FOUNDATIONS OF SECURITY

  • NATIONAL AND INTERNATIONAL SECURITY

    • AI integration in airport security: a case study of sofia airport within bulgaria’s critical infrastructure framework

      pg(s) 76-78

      This paper examines the integration of artificial intelligence (AI) in airport security, with a particular focus on Sofia Airport within Bulgaria’s critical infrastructure framework. It explores the growing significance of AI in enhancing security protocols at airports, which are critical nodes in national and international transportation networks. The case study highlights a collaborative effort between Sofia Airport and VIP Security, where the “VIP Eye” system was demonstrated to airport officials for testing and feedback. VIP Eye, an AI-driven solution, is designed to detect and mitigate security threats with high precision, featuring capabilities such as weapon detection, masked face recognition, and the identification of physical altercations. The collaboration aimed to refine the system based on insights from Sofia Airport’s security expertise, contributing to advancements in security technology. The study also discusses the broader implications of AI adoption for airport security in Bulgaria, considering both technical advancements and the challenges associated with integrating such technologies within the existing security infrastructure.

    • Will Ukraine remember the support given by the EU?

      pg(s) 79-81

      The EU integrates new members through the enlargement process once they meet a number of political and economic conditions. The process encourages democratic and economic reforms in countries that want to become EU members and promotes greater stability and prosperity in Europe.
      Enlargement is the process whereby states join the European Union, after they have fulfilled a set of political and economic conditions. Any European state which respects EU democratic values and is committed to promoting them may apply for EU membership. The accession criteria, or Copenhagen criteria (named after the 1993 Copenhagen European Council meeting which defined them), are the essential conditions all candidate countries must satisfy to become an EU member state. These are: political criteria: stability of institutions guaranteeing democracy, the rule of law, human rights and respect for and protection of minorities; economic criteria: a functioning market economy and the capacity to cope with competition and market forces; administrative and institutional capacity to effectively implement the EU acquis (body of common rights) and ability to take on the obligations of EU membership. The EU’s capacity to take in new members, while maintaining the momentum of European integration, is also an important consideration.

  • INFORMATION SECURITY

    • Analysis of internet of things security breaches

      pg(s) 82-85

      The report analyzes the nature of the Internet of Things (IoT), presents a basic architectural model of IoT, and categorizes IoT according to various criteria. The most famous IoT security breaches are presented. The vulnerabilities that led to the security breaches and the scale and consequences of the impact of the breach are analyzed. Overview and analysis of IoT security breaches are the subject of this research. The main threats and vulnerabilities are systematize and the response of the world community is tracked

    • Possibilities for using steganography methods in the quantum century

      pg(s) 86-87

      Security of confidential information has always been an important issue. The aim of this work is to present and discuss the main themes at a new level in steganography methods nowadays. This review paper introduces a comprehensive survey related to nowadays embedding techniques. Steganography is often used with cryptography so that the information is doubly protected, but the combination of these techniques ensures that even if the steganographic method is discovered, the encrypted data remains secure and unreadable without the proper decryption key. This dual-layered approach significantly enhances the overall security of the hidden information.

    • Artificial intelligence and data security

      pg(s) 88-90

      New technological capabilities are becoming an increasingly important part of our daily lives. If we want to be sustainable and competitive, we as a society must take advantage of them. The huge volume of data cannot be used effectively without the implementation of artificial intelligence algorithms. And to be effective and useful, data must be protected and secure.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY