Стратегии на образователната и научната политика

2024/3, стр. 286 - 297

MODERN SCIENTIFIC PROACTIVE CYBER COUNTERINTELLIGENCE STRATEGIES FOR ADVANCED PERSISTENT THREATS EARLY WARNING

Резюме:

Ключови думи:

Introduction

Digital communications and systems are the norm in modern day society. Widely adopted and ever expanding, that communication domain inherits natural challenges in terms of cyber defense. The execution of cyber-attacks can no longer be confined to a specific geolocation and no longer poses the predictability of geo directionality as the actual breach can happen from within an organization as well as from outside. In many cases public infrastructure such as Gdrive or DroBox can also be used to launch or facilitate cyber-attacks. The main point discussed in the article addresses a rising trend of sophisticated and very aggressive and disrupting cyber-attacks by persistent actors that can target critical communication infrastructure with the aim of permanently disabling functional operations or existence of a specific organization or cyber communication area of control. Due to the nature and dedication of threat actors these types of attacks can be considered existentially threatening. That’s why generating new scientific concepts and strategies for defending in more effective way modern cyber nets need applying multi-dimensional strategies. So new concepts of multilateral approach are needed.

Quite normally most research and publicly available information, the analysis of the activities of a threat actor is post factum. In other words, a breach and objectives already occurred. Detection principles based on those analysis, naturally, can confine the actual defense response and methodology of protection to what is known. This article aims at providing a suggestive practical approach for an early detection strategies and mechanisms regardless of that fact in cases where the final objective is disruption of critical infrastructure operations.

A guiding concept for this research is exactly that, the assumption that the most successfully executed attacks are the ones that have not been found, detected or have been found but details about the information are not publicly disclosed. Thus not making it easy to analyze and develop detection concepts, strategies and mechanisms.

Any cyber-attack goes through a life cycle just as any threat actor, advanced or not, has certain techniques and or procedures and tools it is using. Those can change in terms of actual time and tools but the principle is the same. This is reviewed and used in the article as a non-deterministic approach of helping the suggested detection methodology. The article also provides sub examples of such detection approach and methodology.

Main components and definitions

Cyber lateral intelligence. This is the process utilized by an attacker that has already established a foothold inside an entity or organization – to discover, target, attack and exploit high value targets inside the organization – in order to achieve its goals. In other words – the final objective.1

Counter cyber lateral intelligence. This is the process of countering the intelligence or reconnaissance activities above in order to prevent the attacker from achieving its goals.2 Preemptive cyber intelligence. This is the process of doing in advance procedures and cyber analysis in order to highlight a potential breach that is about to be engaged in an attack or imminently exploit the actual threat actor’s objective. This process can also be part of a network defense activity – active hunting.3

An Advanced Persistent threat (APT) is defined by National Institute of Standards and Technology as follows: “An adversary with sophisticated levels of expertise and significant resources, allowing it through the use of multiple dierent attack vectors (e.g., cyber, physical, and deception), to generate opportunities to achieve its objectives which are typically to establish and extend its presence within the information technology infrastructure of organizations for purposes of continually ex-filtrating information and/or to undermine or impede critical aspects of a mission, program, or organization, or place itself in a position to do so in the future; moreover, the advanced persistent threat pursues its objectives repeatedly over an extended period of time, adapting to a defender’s eorts to resist it, and with determination to maintain the level of interaction needed to execute its objectives.”4

An adversary has a dedicated team, organization, and motif. One of the most difficult APT groups to defend against can be the ones that are not influenced by monetary value – those APT teams do it for pride or to prove a point of expertise – recognition & achievement, politically motivated – hacktivism or acting on behalf of a country/motherland – state actors, patriotically motivated.

Since there is no financial game at play, the dedication and thus capabilities in terms of persistence of those groups is endless and limitless.

In that line of view, in a lot of cases, the time factor – time to start the operation – may not be relevant. In other words, there is enough time for preparation and defining subsequent targets and decision making is not influenced by cost.

Life cycle of an attack

Even with the obvious advantage of the above – the process of achieving those goals needs to go through its respective phases. Lockheed Martin has defined those as follows: reconnaissance, weaponization, deliver, exploitation, installation, command and control, actions on objective.5 Each phase has its viable possibility associated with it of the APT actor being uncovered. Those hints (giveaways) can vary: from mentions or hints (by mistake or on purpose) in social media accounts, for example X, Linkedin, Instagram and others, to talking about it in friendly circles and dark forums, to actually being discovered by the defending side.

Techniques Tactics Procedures

An attacking side or actor in most cases uses certain actions and procedures that can be grouped and categorized. One of the most widely used knowledge base for techniques, tactics and procedures (abbreviated as TTPs) used by malware adversaries is produced by MITRE.

“MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the creation of ATT&CK, MITRE is fulfilling its mission to solve problems for a safer world – by bringing communities together to develop more eective cybersecurity. ATT&CK is open and available to any person or organization for use at no charge.”6

Diamond model of intrusion analysis

A framework model for analyzing and detecting activities of malware actors was developed and proposed by Sergio Caltagirone, Andrew Pendergast, and Christopher Betz in a 2013, U.S. Department of Defense technical report titled “The Diamond Model of Intrusion Analysis” (Caltagirone, Pendergast & Betz 2013). “…the model describes that an adversary deploys a capability over some infrastructure against a victim” (Caltagirone, Pendergast & Betz 2013). The model is depicted in the Fig. 1.

Figure 1. Diamond model for intrusion detection

Dwell time

Dwell time is the period of time between when an attack starts/begins and has been detected. The time range itself can vary depending on a multitude of factors including geographical location, culture, target and objective. The median dwell time however is in a constant decline as reported by different security vendors.

Average dwell time as recorded by Mandiant Solutions is shone on the Fig. 2:

Figure 2. Median dwell time trends – Mandiant7

Thus, in most cases we can conclude that in general the attackers are forced into achieving their objective with higher pace due to improving technology and knowledge of the defenders. Which in turn can result in an advantage for the defenders as the short dwell time means more verbosity, more movement and communication in a shorter period of time – which ultimately exposes TTPs easier.

Types of APTs

One factual point that exists is that there are many APT groups – both known and unknown. Each APT group has specific targets that can vary by size, culture, language, organization etc. Thus each APT group has tactics and strategy that may be known, little known or unknown. Which has the expected effect of increasing the difficulty of detection and establishing effective strategy to do so in different types of organizations and cultures.

Known Knowns –APTsAPTs we are aware of and understandtheir TTPsKnown UnknownsAPTsAPTs we are aware of but do not understandtheir TTPsUnknown KnownsAPTsAPTs we understand but are not awareof their TTPsUnknown UnknownsAPTsAPTs we neither aware of nor understand theirTTPs

Figure 3. Types of APTs and their TTPs (Author)

APTs targets

Considering the above a target can be anything beyond the obvious gains in terms of – political, military or personal efforts. In other words, a target and the reason for targeting can be unknown.

Attribution

Nowadays it is extremely difficult to attribute and prove beyond doubt that something happened in the cyber medium coming specifically from an individual, team, organization, department or military unit. There are many questions that need yes or no type of answers that are impossible to prove beyond doubt in a court of law. If a web page is visited from a house‘s public IP address, in a home for example, for an investigating organization – it is often impossible to determine:

1. If the web page visit was done by a specific person, a member of the family or when a guest was visiting, by the guest.

2. It is also impossible to confirm 100% the exact device that the web page was visited.

3. It is also impossible to confirm if it was done intentionally – someone purposefully typed in the address in the browser or click on a web page address vs someone was mislead to click by a phishing mail/advertisement vs if the device that the web page visit was made for was beyond doubt hacked and it was actually done by the hacker

Assuming it is possible to indisputably find and prove the above in many cases it is still not enough to bring the perpetrators to justice (assuming non state sponsored APT groups) due to government, geopolitical regulations and political or strategic views. One simple reason can be that there simply might not be extradition policy between different governments depending on the specific case or in case perpetrators are located in a different country. This means – even if proven and discovered – the APT groups activity or the activity of its members will not necessarily seize. Thus contributing to the problematic of minimizing the volume of attacks.

The Network

One indisputable fact is that when communication is happening in the cyber security domain – communication, in its main component, preceding, during and post the attack must happen over the network communication medium. There simply is no other way of doing it.

In some cases when targets are highly secure and air gapped, the communication activities can only be observed inside that air gapped environment, inside that security domain. In such cases once the actor is inside the domain – it still evolves and communicates over the network.

In one such case, in an effort to contain and defend against intrusions, external media devices were forbidden: “The Defense Department’s geeks are spooked by a rapidly spreading worm crawling across their networks. So they’ve suspended the use of so-called thumb drives, CDs, flash media cards, and all other removable data storage devices from their nets, to try to keep the worm from multiplying any further. … The ban comes from the commander of U.S. Strategic Command, according to an internal Army e-mail. It applies to both the secret SIPR and unclassified NIPR nets. The suspension, which includes everything from external hard drives to “floppy disks,” is supposed to take eect “immediately.” Similar notices went out to the other military services.”8

In such cases the unwanted activity can still be observed on the network but in a lateral/internal way – post breach. Thus leaving the network as the only possible medium of communication.

Missed APT attacks

Every successful APT group attack has a preemptive stage before the actual deployment or take over happens. The prelude or the communication prior to the actual trigger is usually missed.

In the most difficult, dangerous and destructive operations of APT groups – the goals are actually non profit/non financial and non espionage. Example: critical infra take down or take over – complete communication or operational functioning capability take down of an organization. Such cases are more common than expected, anticipated or thoughts. The take down of the Viasat network Service provider is one such example:“Viasat told Reuters the outage aected satellite modems owned by tens of thousands of customers in Europe. Some of those modems are still oine at time of writing, according to the report, and bringing them back online is going to be a fairly involved process.”9

Important point to consider is that threat actors can purposefully destroy devices to take down an organization’s infrastructure and operations. Just recently, a wellknown vendor advised customers to replace their physical devices because patching the software vulnerability was not possible.

Challenges

Omission of some basic cyber warfare principles are usually leading to a blind spot in the security controls, objectives and the security deployment goals. Most defensive protections are often enough influenced:

– by fear/anxiety/anticipation or political goal

– commercial perspective – cost of deployment

– reactive deployment – based on response from a current or ongoing breach These basic principles of those deployments – contradict and are poised to miss out the basic principle of determination of the not for profit, non-espionage APT groups objectives and goals.

Security controls

In such and other cases where critical network communication devices like routers, switches, firewalls, VPN concentrators are targeted specifically, endpoint detection and response (EDR) cannot help organizations defend against threat actors. This is why it’s so important that organizations implement a layered defense that pairs EDR with network monitoring – especially on critical infrastructure. Only when they have network visibility can organizations rapidly detect threats – and this is critical to mitigate the damage that can be done following a successful attack.

Another major blind spot is actually monitoring edge or legacy devices where endpoint detection cannot be installed. For example, SCADA devices, medical and pretty much a big chunk of the Military, Industrial, Medical and Automotive devices domains. Very often there are Common Vulnerabilities and Exposures (CVE) of such systems being unearthed and disclosed. One such example is CVE from Fortiguard – Cyber Security company located in Sunnyvale, California.10

Some network security monitoring vendors are already actively noting the problem, for example Stamus Networks11.

A big point to consider is vulnerabilities or breaches that we do not know about or that are not public. Hence amplifying the already perilous necessity to be able to monitor all communication aspects, the very minimum – of critical network communications infrastructure.

Additional aspect that brings yet another challenge is that one cannot protect what one doesn’t know is there. In other words one cannot protect and monitor devices that are unknown and exist in the organization. Often such devices like bring your on device (BYOD).

Wrong Assumptions

Opponents.There may be opponents and or APT groups that are unknown including their respective goals and objectives. Do not assume all your opponents are known and or find-able.

Time. Understanding the time of operations and activities that an organization must defend itself from is essential for success. The fact that a person or organization does not do operations during Sunday, during Christmas time off or during New year does not mean the opponent will do the same. On the positive side though – if there is any unusual communication during that time – it would have a better chance to be picked up by the defending side.

Underestimating your opponent. One of the biggest mistakes that can be made and in many cases is still done towards an opponent is to underestimate the capabilities or determination.

Lack of visibility overestimating your defenses. Lack of visibility from a security perspective can result in overestimating the capabilities of the existing cyber defense deployment.

Defense perimeter and criticality. Know your cyber defense perimeter. This part very often comprises the essence of the blind spot. It is the age of IT/IoT/Mobile networks. Often enough many organizations do not have a robust way of identifying, inventorying, reporting and analyzing all devices or communication points on the network. In other words the basic question : “What and how many devices reside in dierent parts of my network” cannot be answered with 100% certainty. This is even more amplified during crisis situations like natural/ industrial disasters or military conflicts.

There are critical devices present in the communication domain that are in many cases often unknown – example legacy and unmigrated systems or test and non-production systems that do hold critical data that allows an attacker to use it and leverage privileged access to actual production critical systems. One such example case was reported by Microsoft Corporation in January 2024.12

Early warning strategies and concepts

Critical systems monitoring strategy. Map out the most critical systems monitoring. Those are systems that when oine or unavailable – the organization or the bigger information system – ceases to function. Concentrate the following methodology on communication coming towards those types of systems.

The concept of early warning signals can be observed on the network some time before the APT enters its actual Actions Objectives stage from the Lockheed Martin Cyber Kill Chain. Mainly two big parts that follow.

1. Communication from new sender

The basic principle of visualizing the event from a security perspective is a new sender on the communication medium – communication from a new sender.

One example of such activity in the realm of cyber security can be communication from a Newly Registered Domain (NRD) to and from a critical system or device.

NRD by itself alone does not mean something is good or bad. It is just a piece of information. Often enough used by threat actors utilize this method as the domain used in its communication is new and its analysis from a security perspective has not been done yet by the security vendors.

One of the challenges with analyzing or even finding NRDs is that the availability of the data that the domain was registered today for example - depends entirely on the Domain Name Registrar for the country where that domain was registered.

There are also possibilities to use NRD as a subdomain of a very legitimate public service – like Google/Cloudflare/Microsoft and by using custom domain names under those registrars.13

2. Previously unseen/unique Communication

The basic principle of visualizing this communication event from a security perspective is a new previously unseen communication – uniquely new communication event.

Detection concepts

The above would allow for high level break down of detection events with the following four cases, based on two major types of communication – encrypted and unencrypted:

1. new unique unencrypted communication to and from critical system;

2. new unique encrypted communication to and from critical system;

3. new unique unencrypted communication & new sender to and from critical system;

4.new unique encrypted communication & new sender to and from critical system.

The detection concepts above are not meant to provide a single linear detection event but rather allow for a detection formula methodology for an early detection possibility that is a prelude to a final stage of an attack. Thus allowing a defending team to apply the strategies of thwart the objective of an elusive threat actor that has already managed to bypass existing cyber defenses.

Actual example

This is a simpler method where any new previously unseen communication can be hashed and documented and only new ones each time period/day can be observed.

Knowing when certain communication metadata pieces are being seen on the network for the first time provides a big advantage to any hunter. Here, the analyst may view first time sightings of domain queries, HTTP hosts, JA3, JA3S, SMB file transfers, TLS certificates, TLS SNI, and more.” (Manev 2023).

An effective example of a process of preemptive Counter-cyber Intelligence for Early Detection of Advanced Persistent Threat is summed up by this review blog (Manev 2023). Its concept, in essence, is analyzing a combination of new and previously unseen and newly registered domain communication.

This can further be enhanced and optimized for critical network equipment via exclusively looking into communication to and from that specific part of the network medium.

Some formulas based on using world renowned and famous Suricata14 Network Security monitoring engine can be as follows below. The one below are queries in the Kibana, Lucene query syntax, based on data in Elasticsearch15 database. Those queries can easily be adjusted to other databases or Security Information and Event Management (SIEMs) systems. A few examples follow:

Seek and display all encrypted connections based on combination of NRD and previously unseen labeled network flows:

event_type:flow AND metadata.flowbits:*stamus.nrd.entropy* AND metadata. flowbits:*stamus.sightings* AND app_proto.keyword:tls

Seek and display all connections based on a combination of NRD and previously unseen labeled network communication based on HTTP where the data transferred is more than 10Kbs. The point of the formula here is that HTTP is clear text and it should really not happen to and from critical devices in the organization.

event_type:http AND metadata.flowbits:*stamus.nrd* AND metadata. flowbits:*stamus.sightings* AND app_proto.keyword:http AND flow.bytes_toclient:>10000

Seek and display all unencrypted, HTTP based communication based on combination of NRD and previously unseen labeled network flows where an executable was downloaded:

event_type:alert AND metadata.flowbits:*stamus.nrd* AND metadata. flowbits:*stamus.sightings* AND alert.signature:*exe* AND http.status:200

The formulas above can be further developed to cover more different types of communication from critical infrastructure devices in order to improve the concepts and strategies.

Conclusion

Uncovering unwanted actions of a little known adversary or a multitude of adversaries is not an easy task. It never was. The basic unconditional truth and end result is that at some point of time, unavoidably a threat actor must communicate over the network medium. The communication can be to either fetch more information from a central server (Command and Control), to deploy more tools or simply to check in and acknowledge that the environment is still breached and available.

The proposals in this article aim at providing a basis for a working foundation, concepts and strategies that can match, highlight and expose the actions of a malware actor before it starts executing their final objectives – thus preventing (further) breach or disaster. The proposed measures range from understanding and better evaluating an organization’s exposure to actual examples of working queries that have a capability to generically expose unwanted behavior that can be or may lead to an advanced persistent threat actor lurking in the environment.

Acknowledgments and funding

The report was prepared with the financial support of the National Science Program “Security and Defense”, financed by the Ministry of Education and Science of the Republic of Bulgaria, in implementation of the Decision of the Council of Ministers of the Republic of Bulgaria No. 731 of 21.10.2021.

NOTES

1. Author’s definition.

2. Author’s definition.

3. Author’s definition.

4. https://csrc.nist.gov/glossary/term/advanced_persistent_threats, Sources: NIST SP 800-137 from NIST SP 800-39, available 27.02 2024.

5. MARTIN, L., 2024. The Cyber Kill Chain®. Available at: https://www. lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html (27.02.2024).

6. https://attack.mitre.org/, available 27.02.2024.

7. https://inthecloud.withgoogle.com/mandiant-m-trends-2023/download.html, available 27.02.2024;

https://www.mandiant.com/m-trends, available 27.02.204.

8. https://www.wired.com/2008/11/army-bans-usb-d/, available 27.02.2024.

9.https://www.pcmag.com/news/report-nsa-investigates-viasat-hack-thatcoincided-with-ukraine-invasion, avaliable 27.02.2024 .

10. https://fortiguard.fortinet.com/psirt/FG-IR-24-015, avalable 27.02.2024 .

11. https://www.stamus-networks.com/blog/the-rise-of-network-infrastructureattacks-and-what-to-do-about-them, avalable 27.02.2024.

12. https://msrc.microsoft.com/blog/2024/01/microsoft-actions-followingattack-by-nation-state-actor-midnight-blizzard/, avalable 27.02.2024.

13.https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/ using-https-alternate-domain-names.html, avalable 27.02.2024.

14. https://suricata.io/, avalable 27.02.2024.

15. https://www.elastic.co/elasticsearch, avalable 27.02.2024.

REFERENCES

CALTAGIRONE, S.; PENDERGAST, A. & BETZ, C. 2013. The Diamond Model of Intrusion Analysis. Available at: https://apps.dtic.mil/sti/pdfs/ ADA586960.pdf (27.02.2024).

MANEV, P., 2023. Threat Hunting for Unknown Actors & Threats using NRD and Sightings. Available at: https://www.stamus-networks.com/ blog/threat-hunting-for-unknown-actors-threats-using-nrd-and-sightings, (27.02.2024).

MARTIN, L., 2024. The Cyber Kill Chain®. Available at: https://www. lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html (27.02.2024).

2025 година
Книжка 4
ТРАНСФОРМАЦИИ НА ПАЗАРА НА ТРУДА И НУЖДАТА ОТ ОБРАЗОВАТЕЛНИ РЕФОРМИ

Ваня Иванова, Андрей Василев, Калоян Ганев, Ралица Симеонова-Ганева

Книжка 3
FORMING ENTREPRENEURIAL CULTURE THROUGH EDUCATION

Prof. Dr. Milena Filipova, Adriana Atanasova, PhD student

Книжка 2s
THE STATE OF INCLUSION IN ADAPTED BASKETBALL

Dr. Stefka Djobova, Assoc. Prof., Dr. Ivelina Kirilova, Assist. Prof.

THE IMPACT OF AGE ON ADULT’S PARTICIPATION IN PHYSICAL ACTIVITIES DURING LEISURE TIME

Dr. Despina Sivevska, Assoc. Prof. Dr. Biljana Popeska, Assoc. Prof.

Книжка 2
MODEL OF PROFESSIONALLY DIRECTED TRAINING OF FUTURE ENGINEER-TEACHERS

Prof. Ivan Beloev, Dr. Valentina Vasileva, Assoc. Prof. Dr. Іnna Savytska, Assoc. Prof., Dr. Oksana Bulgakova, Assoc. Prof. Dr. Lesia Zbaravska, Assoc. Prof., Dr. Olha Chaikovska, Assoc. Prof.

QUALITY OF HIGHER EDUCATION IN BULGARIA: COMMUNICATION AND COMPUTER TECHNOLOGY TRAINING

Prof. Rositsa Doneva, Dr. Silvia Gaftandzhieva, Assoc. Prof.

ВЛИЯНИЕ НА ОБРАЗОВАНИЕТО И ЧОВЕШКИЯ КАПИТАЛ ВЪРХУ ФОРМАЛНАТА И НЕФОРМАЛНАТА ИКОНОМИКА

Проф. д-р Стефан Петранов, доц. д-р Стела Ралева, доц. д-р Димитър Златинов

DETERMINANTS AFFECTING ACADEMIC STAFF SATISFACTION WITH ONLINE LEARNING IN HIGHER MEDICAL EDUCATION

Dr. Miglena Tarnovska, Assoc.Prof.; Dr. Rumyana Stoyanova, Assoc.Prof.; Dr. Angelina Kirkova-Bogdanova; Prof. Rositsa Dimova

Книжка 1s
CHALLENGES FACED BY THE BULGARIAN UNIVERSITIES IN THE CONTEXT OF SCIENCE – INDUSTRY RELATIONS

Dr. Svetla Boneva, Assoc. Prof., Dr. Nikolay Krushkov, Assoc. Prof.

INVENTING THE FUTURE: CAN BULGARIAN UNIVERSITIES FULFILL THEIR MISSION AS CATALYSTS FOR ECONOMIC GROWTH AND SUSTAINABILITY?

Dr. Ralitsa Zayakova-Krushkova, Assist. Prof., Dr. Alexander Mitov, Assoc. Prof.

AN INNOVATIVE MODEL FOR DEVELOPING DIGITAL COMPETENCES OF SOCIAL WORKERS

Prof Dr. Lyudmila Vekova, Dr. Tanya Vazova, Chief Assist. Prof., Dr. Penyo Georgiev, Chief Assist. Prof., Dr. Ekaterina Uzhikanova-Kovacheva

BUSINESS ASPECTS OF ACADEMIC PUBLISHING

Dr. Polina Stoyanova, Chief Assist. Prof.

THE ECONOMIC IMPACT OF MUSIC STREAMING

Dr. Dimiter Gantchev, Assist. Prof.

FILM INCENTIVE SCHEME IN THE REPUBLIC OF BULGARIA

Dr. Ivan Nachev, Assist. Prof.

PATENT PROTECTION OF DIGITAL TWINS

Dr. Vladislava Pаcheva, Chief Assist. Prof.

Книжка 1

МНОГОСТРАНЕН ПОДХОД ЗА ИЗСЛЕДВАНЕ РАВНИЩЕТО НА ДИГИТАЛИЗАЦИЯ В ПОДГОТОВКАТА НА БЪДЕЩИ УЧИТЕЛИ

Доц. д-р Бистра Мизова, проф. д-р Румяна Пейчева-Форсайт Проф. д-р Харви Мелър

2024 година
Книжка 6s
DISRUPTIVE TECHNOLOGIES RISK MANAGEMENT

Dr. Miglena Molhova-Vladova, Dr. Ivaylo B. Ivanov

THE DUAL IMPACT OF ARTIFICIAL INTELLIGENCE: CATALYST FOR INNOVATION OR THREAT TO STABILITY

Prof. Diana Antonova, Dr. Silvia Beloeva, Assist. Prof., Ana Todorova, PhD student

MARKETING IN TOURISM: PRACTICAL EVIDENCES

Dr. Fahri Idriz, Assoc. Prof.

DEVELOPMENT OF THE INFORMATION ECONOMY CONCEPT AND THE TRANSITION TO INDUSTRY 5.0

Dr. Dora Doncheva, Assist. Prof., Dr. Dimitrina Stoyancheva, Assoc. Prof.

THE GLOBAL MARKET AS A PROJECTION OF THE INFORMATION ECONOMY

Dr. Vanya Hadzhieva, Assist. Prof. Dr. Dora Doncheva, Assist. Prof.

ACADEMIC ENTREPRENEURSHIP: PRACTICAL RESULTS AND TRAINING

Prof. Nikolay Sterev, DSc., Dr. Daniel Yordanov, Assoc. Prof.

Книжка 6
AN INTEGRATIVE APPROACH TO ORGANIZING THE FORMATION OF STUDENTS’ COGNITIVE INDEPENDENCE IN CONDITIONS OF INTENSIFICATION OF LEARNING ACTIVITIES

Dr. Albina Volkotrubova, Assoc. Prof. Aidai Kasymova Prof. Zoriana Hbur, DSc. Assoc. Prof. Antonina Kichuk, DSc. Dr. Svitlana Koshova, Assoc. Prof. Dr. Svitlana Khodakivska, Assoc. Prof.

ИНОВАТИВЕН МОДЕЛ НА ПРОЕКТНО БАЗИРАНО ОБУЧЕНИЕ НА ГИМНАЗИАЛНИ УЧИТЕЛИ: ДОБРА ПРАКТИКА ОТ УниБИТ

Проф. д-р Жоржета Назърска, доц. д-р Александър Каракачанов, проф. д-р Магдалена Гарванова, доц. д-р Нина Дебрюне

Книжка 5s
КОНЦЕПТУАЛНА РАМКА ЗА ИЗПОЛЗВАНЕ НА ИЗКУСТВЕНИЯ ИНТЕЛЕКТ ВЪВ ВИСШЕТО ОБРАЗОВАНИЕ

Акад. д.н. Христо Белоев, проф. д.н. Валентина Войноховска, проф. д-р Ангел Смрикаров

ИЗКУСТВЕНИЯТ ИНТЕЛЕКТ В БИЗНЕСА – ФИНАНСОВИ, ИКОНОМИЧЕСКИ И МАРКЕТИНГОВИ АСПЕКТИ

Проф. д-р Андрей Захариев, доц. д-р Драгомир Илиев Гл. ас. д-р Даниела Илиева

RECENT TRENDS AND APPLICATIONS OF THE ARTIFICIAL INTELLIGENCE IN THE EDUCATION

Prof. Dr. Plamen Zahariev, Prof. Dr. Georgi Hristov, Prof. Dr. Ivan Beloev

COMPARATIVE ANALYSIS OF UTILIZING POPULAR INTELLIGENT COMPUTER SYSTEMS IN EDUCATION

Dr. Galina Ivanova, Assoc. Prof. Dr. Aleksandar Ivanov, Assoc. Prof.

CONCEPTUAL MODEL OF TRAINING IN REMOTE VIRTUAL SUPERVISION IN SOCIAL WORK

Dr. Silviya Beloeva, Assist. Prof. Dr. Nataliya Venelinova, Assist. Prof.

ИЗСЛЕДВАНЕ ПРИЛОЖИМОСТТА НА БЛОКОВИ ВЕРИГИ ОТ ПЪРВО НИВО (L1) В СИСТЕМА ЗА ЕЛЕКТРОННО ОБУЧЕНИЕ

Андриан Минчев, проф. Ваня Стойкова, гл. ас. д-р Галя Шивачева Доц д-р Анелия Иванова

DIGITAL DISCRIMINATION RISKS IN THE TRANSFORMATION OF HIGHER EDUCATION

Dr. Silviya Beloeva, Assist. Prof. Dr. Nataliya Venelinova, Assist. Prof.

OPPORTUNITIES, CHALLENGES AND SOLUTIONS FOR DIGITAL TRANSFORMATION OF THE EDUCATIONAL PROCESSES THROUGH 3D TECHNOLOGIES

Prof. Georgi Hristov, Prof. Plamen Zahariev, Dr. Diyana Kinaneva, Assist. Prof., Georgi Georgiev, Assist. Prof.

ДИГИТАЛНОТО ПОКОЛЕНИЕ VS. СЛЯТОТО, ПОЛУСЛЯТОТО И РАЗДЕЛНОТО ПИСАНЕ

Доц. д-р Владислав Маринов, ас. Анита Тодоранова

OPPORTUNITIES AND CHALLENGES FOR THE EDUCATION OF STUDENTS WITH SPECIAL EDUCATIONAL NEEDS IN THE DIGITAL ENVIRONMENT: THE NEW NORMAL

Prof. Julia Doncheva, DSc., Dr. Galina Ivanova, Assoc. Prof. Dilshod Tojievich Oblokulov

ИЗГРАЖДАНЕ НА КОМПЕТЕНЦИИ ЗА РАЗРАБОТВАНЕ НА STEM ОБУЧИТЕЛНИ РЕСУРСИ У БЪДЕЩИ УЧИТЕЛИ ПО ПРИРОДНИ НАУКИ

Доц. д-р Евгения Горанова, проф. д.н. Валентина Войноховска, проф. д-р Ангел Смрикаров

APPLICATION OF ZSPACE TECHNOLOGY IN THE DISCIPLINES OF THE STEM CYCLE

Boyana Ivanova, Assist. Prof. Dr. Kamelia Shoilekova, Assoc. Prof. Dr. Desislava Atanasova, Assoc. Prof. Dr. Rumen Rusev, Assoc. Prof.

TEACHERS' ADAPTATION TO CHANGES IN AN INCREASINGLY COMPLEX WORLD THROUGH THE USE OF AI

Prof. Zhanat Nurbekova, Kanagat Baigusheva, Kalima Tuenbaeva, Bakyt Nurbekov Prof. Tsvetomir Vassilev

АТОСЕКУНДНОТО ОБУЧЕНИЕ – МЕТАФОРА НА ДНЕШНОТО ОБРАЗОВАНИЕ

Проф. д.н. Юлия Дончева, Денис Асенов, проф. д-р Ангел Смрикаров проф. д-р Цветомир Василев

APPLICATION AND ASSESSMENT OF DIGITAL RESOURCES IN THE EDUCATION OF FUTURE PEDAGOGUES

Dr. Galina Ivanova, Assoc. Prof., Dr. Milena Velikova, Assist. Prof.

IDENTIFYING PLAYER TYPES IN THE CLASSROOM FOR EFFECTIVE GAMIFICATION

Dr. Desislava Atanasova, Assoc. Prof., Viliana Molnar

DEVELOPMENT AND INTEGRATION OF AUDIO AND VISUAL MICRO-RESOURCES IN THE LEARNING PROCESS THROUGH THE USE OF ARTIFICIAL INTELLIGENCE SYSTEMS

Dr. Petya Stefanova, Assist. Prof., Dr. Assist. Elitsa Ibryamova, Assist. Prof., Prof. Angel Smrikarov, Dr. Galina Ivanova, Assoc. Prof.

АНАЛИЗ НА ПРОГРАМНИТЕ МОДЕЛИ ЗА АВТОМАТИЗИРАНЕ НА КОГНИТИВНИ ПРОЦЕСИ

Доц. д-р Валентин Атанасов Доц. д-р Анелия Иванова

Книжка 5
MANAGING A POSITIVE AND LIFE-SKILLS DEVELOPMENT IN THE SCHOOL-BASED CURRICULA: A LITERATURE REVIEW ON THE SUSTAINABLE EDUCATION

Dr. Lindita Durmishi, Assoc. Prof., Dr. Ardian Durmishi Prof. Milena Filipova Dr. Silva Ibrahimi

APPLICATION OF THE COMPETENCY MODEL IN BUSINESS ADMINISTARATION HIGHER EDUCATION IN HORIZON 2030

Prof. Nadya Mironova, Dr. Tatyana Kicheva, Assoc. Prof., Dr. Miglena Angelova, Assoc. Prof.

Книжка 4s
THE EDUCATION AND RESEARCH IN THE QUADRUPLE HELIX AND THE REGIONAL INNOVATION PROSPECTS

Prof. Dr. Milen Baltov Dr. Stela Baltova, Assoc. Prof. Dr. Vilyana Ruseva, Assoc. Prof.

Книжка 4
ATTITUDES OF STUDENTS – FUTURE TEACHERS, FOR THE APPLICATION OF GENERATIVE ARTIFICIAL INTELLIGENCE

Assoc. Prof. Nikolay Tsankov, DSc. Dr. Ivo Damyanov, Assist. Prof.

EDUCATIONAL NEEDS OF THE JUDICIAL ADMINISTRATION IN THE CONTEXT OF DIGITALIZATION

Dr. Diana Dimitrova, Dr. Darina Dimitrova, Assoc. Prof., Dr. Velina Koleva

MANAGERIAL ASPECTS OF COOPERATION AMONG HIGHER EDUCATION INSTITUTIONS AND THEIR STAKEHOLDERS

Prof. Olha Prokopenko, DSc. Dr. Svitlana Perova, Assoc. Prof. Prof. Tokhir Rakhimov, DSc.

APPLICATION OF EDUCATIONAL STRATEGIES IN STUDYING THE DYNAMICS OF STATE POWER STRUCTURES: IMPLEMENTATION OF FORMAL AND INFORMAL MECHANISMS OF INFLUENCE

Prof. Stoyan Denchev, DSc. Dr. Miriyana Pavlova, Assist. Prof. Dr. Steliana Yordanova, Assist. Prof.

ДИАГНОСТИКА НА ФОРМИРАНАТА ПРОФЕСИОНАЛНА КОМПЕТЕНТНОСТ НА БЪДЕЩИ ИНЖЕНЕРИ ПО ЕНЕРГЕТИКА

Гл. ас. д-р Надя Илиева Доц. д-р Елена Бояджиева Ивалина Маринова

Книжка 3s
A MODEL FOR CALCULATING THE INDIRECT ADDED VALUE OF AI FOR BUSINESS

Dr. Petya Biolcheva, Assoc. Prof., Prof. Nikolay Sterev, DSc.

AI EFFECTIVENESS AND RISK ASSESSMENT OF INVESTMENTS IN HIGH-RISK START-UPS

Sotir Ivanov, PhD Student, Dr. Petya Biolcheva, Assoc. Prof.

COMPETITIVENESS OF TEXTILE PRODUCERS IN DIGITAL BUSINESS ERA

Prof. Nikolay Sterev, DSc., Dr. Vyara Milusheva, Assoc. Prof.

CHALLANGES OF USING ARTIFICIAL INTELLIGENCE IN MANAGEMENT DECISION MAKING

Dr. Bozhana Stoycheva, Assist. Prof. Dr. Pavel Vitliemov, Assoc. Prof.

THE SIGNIFICANCE OF ERASMUS+ MOBILITY IN BUSINESS EDUCATION: AN EXAMINATION OF A SUCCESSFUL BULGARIAN-MEXICAN COLLABORATION

Dr. Lyudmila Mihaylova, Assoc. Prof. Dr. Emil Papazov, Assoc. Prof. Dr. Diana E. Woolfolk Ruiz

Книжка 3
ИГРОВИ ПОДХОДИ В ОБУЧЕНИЕТО: УНИВЕРСИТЕТСКИ КОНТЕКСТ

Проф. д.н. Цветан Давидков Силвия Тонева, докторант

Книжка 2
FORMATION OF PROFESSIONAL SKILLS OF AGRICULTURAL ENGINEERS DURING LABORATORY PRACTICE WHEN STUDYING FUNDAMENTAL SCIENCE

Dr. Ivan Beloev, Assoc. Prof. Dr. Oksana Bulgakova, Assoc. Prof., Dr. Oksana Zakhutska, Assoc. Prof., Dr. Maria Bondar, Assoc. Prof. Dr. Lesia Zbaravska, Assoc. Prof.

ИМИДЖ НА УНИВЕРСИТЕТА

Проф. д.п.н. Галя Христозова

Книжка 1s
COMPETITIVENESS AS A RESULT OF CREATIVITY AND INNOVATION

Dr. Nikolay Krushkov, Assoc. Prof. Dr. Ralitza Zayakova-Krushkova

INNOVATION, TECHNICAL PROGRESS AND ECONOMIC DEVELOPMENT

Dr. Aleksandar Aleksandrov, Assist. Prof.

ENHANCING ECONOMIC SECURITY THROUGH INTELLECTUAL PROPERTY

Dr. Dimiter Gantchev, Assist. Prof.

INTELLECTUAL PROPERTY AND SECURITY IN THE INTEGRATED CIRCUITS INDUSTRY

Dr. Ivan Nachev, Dr. Yuliana Tomova, Iskren Konstantinov, PhD student, Marina Spasova, student

GREEN TRADEMARKS AND SUSTAINABILITY

Dr. Silviya Todorova, Assist. Prof.

ARTIFICIAL INTELLIGENCE AND ITS PROTECTION AS AN INVENTION

Dr. Vladislava Pаcheva, Assist. Prof.

Книжка 1
PROBLEMS AND PERSPECTIVES FOR SOCIAL ENTREPRENEURSHIP IN HIGHER EDUCATION

Prof. Dr. Milena Filipova Prof. Dr. Olha Prokopenko Prof. Dr. Igor Matyushenko, Dr. Olena Khanova, Assoc. Prof. Dr. Olga Shirobokova, Assoc. Prof. Dr. Ardian Durmishi

RESEARCH OF USING THE SYSTEM APPROACH TO INCREASE PROFESSIONAL COMPETENCE OF STUDENTS IN THE PROCESS OF STUDYING NATURAL SCIENCES

Dr. Ivan Beloev, Assoc. Prof. Dr. Іnna Savytska, Assoc. Prof., Dr. Oksana Bulgakova, Assoc. Prof. Prof. Iryna Yasinetska, Dr. Lesia Zbaravska, Assoc. Prof.

2023 година
Книжка 6s
TRANSFORMING MARITIME EDUCATION FOR A DIGITAL INDUSTRY

Dr. Christiana Atanasova, Assist. Prof.

DEVELOPMENT OF A COMMON INFORMATION SYSTEM TO CREATE A DIGITAL CAREER CENTER TOGETHER WITH PARTNER HIGHER SCHOOLS

Prof. Dr. Yordanka Angelova, Dr. Rossen Radonov, Assoc. Prof. Vasil Kuzmov, Assist. Prof. Stela Zhorzh Derelieva-Konstantinova

DRAFTING A DIGITAL TRANSFORMATION STRATEGY FOR PROJECT MANAGEMENT SECTOR – EMPIRICAL STUDY ON UAE

Mounir el Khatib, Shikha al Ali, Ibrahim Alharam, Ali Alhajeri Dr. Gabriela Peneva, Assist. Prof., Prof. Jordanka Angelova, Mahmoud Shanaa

VOYAGE OF LEARNING: CRUISE SHIPS WEATHER ROUTING AND MARITIME EDUCATION

Prof. Svetlana Dimitrakieva, Dr. Dobrin Milev, Assist. Prof., Dr. Christiana Atanasova, Assist. Prof.

RESEARCH ON THE SUSTAINABLE DEVELOPMENT COMPETENCES OF THE LANDSCAPE ARCHITECT IN PRACTICE

Land. arch. Elena Dragozova, Assoc. Prof., Dr. Stanislava Kovacheva, Assoc. Prof.

STUDY OF THE KEY FACTORS INFLUENCING THE EFFECTIVE PLANNING AND UTILIZATION OF PRODUCTION FACILITIES IN THE INDUSTRIAL ENTERPRISE

Dr. Tanya Panayotova, Assoc. Prof., Dr. Krasimira Dimitrova, Assoc. Prof., Neli Veleva, PhD student

SIMULATOR TRAINING – UNIQUE POWERFUL INSTRUMENT FOR EDUCATING, SKILLS CREATING, MITIGATING SKILLS AND RESILIENCE CREATING

Prof. Dimitar Dimitrakiev, Vencislav Stankov, Assist. Prof., Dr. Christiana Atanasova, Assist. Prof.

СТРУКТУРНИ ПРОМЕНИ В ОБУЧЕНИЕТО НА МЕНИДЖЪРИ ЗА ИНДУСТРИЯ 5.0

Доц. д-р Недко Минчев, доц. д-р Венета Христова, гл. ас. д-р Иван Стоянов

RESEARCH OF THE INNOVATION CAPACITY OF AGRICULTURAL PRODUCERS

Dr. Siya Veleva, Assoc. Prof.; Prof. Dr. Eng. Margarita Mondeshka Dr. Anka Tsvetanova, Assoc. Prof.,

Книжка 6
Книжка 5s
ПРЕСЕЧНАТА ТОЧКА НА СПОРТА, СИГУРНОСТТА И КРИПТО ФЕН ТОКЕНИТЕ

Полк. доц. Георги Маринов Доц. Милена Кулева

ВИДОВЕ ТРАВМИ В ПАРАШУТИЗМА И ПРЕВЕНЦИЯТА ИМ

Капитан III ранг Георги Калинов

ОБУЧЕНИЕ В ХОДЕНЕ С ПОМОЩНИ СРЕДСТВА – РИСКОВЕ И СИГУРНОСТ ЗА ПАЦИЕНТА

Атанас Друмев Доц. д-р Данелина Вачева, доц. д-р Искра Петкова

Книжка 5
ПОДХОДИ ЗА ПСИХОСОЦИАЛНА ПОДКРЕПА НА УНИВЕРСИТЕТСКИ ПРЕПОДАВАТЕЛИ В УСЛОВИЯ НА КРИЗА

Доц. д.н. Цветелина Търпоманова, доц. д.н. Веселина Славова

Книжка 4s
DETERMINING THE DEGREE OF DIGITALIZATION OF A HIGHER EDUCATION INSTITUTION

Acad. DSc. Hristo Beloev, Prof. Dr. Angel Smrikarov, Assoc. Prof. DSc. Valentina Voinohovska, Assoc. Prof. Dr. Galina Ivanova

A STUDY ON THE POSSIBILITIES TO INTEGRATE THE MODERN 3D TECHNOLOGIES IN THE SCIENTIFIC ACTIVITIES OF THE HIGHER EDUCATION INSTITUTIONS

Prof. Dr. Georgi Hristov, Assoc. Prof. Dr. Ivan Beloev, Assoc. Prof. Dr. Plamen Zahariev, Assist. Prof. Dr. Diyana Kinaneva, Assist. Prof. Georgi Georgiev

THE ROLE OF THE UNIVERSITIES AS ACCELERATORS FOR THE INTEGRATION OF THE STEM LEARNING METHODS IN THE PRIMARY AND SECONDARY SCHOOLS

Prof. Dr. Georgi Hristov, Assoc. Prof. Dr. Ivan Beloev, Assoc. Prof. Dr. Plamen Zahariev, Assist. Prof. Georgi Georgiev

ОТ STEM КЪМ BEST: ДВА СТАНДАРТА, ЕДНА ЦЕЛ

Проф. д-р Андрей Захариев, проф. д-р Стефан Симеонов, гл. ас. д-р Таня Тодорова

ВЪЗМОЖНОСТИ ЗА ПРИЛОЖЕНИЕ НА БЛОКЧЕЙН ТЕХНОЛОГИЯТА В ОБРАЗОВАНИЕТО

Докторант Андриан Минчев, доц. д-р Ваня Стойкова

ПРЕДИЗВИКАТЕЛСТВА НА ДИГИТАЛНАТА ТРАНСФОРМАЦИЯ В ОБРАЗОВАНИЕТО – СРАВНИТЕЛЕН АНАЛИЗ НА СТУДЕНТСКОТО МНЕНИЕ

Гл. ас. д-р Мирослава Бонева, доц. д-р Антон Недялков, проф. д.н. Милена Кирова

CHALLENGES, REQUIREMENTS, OPPORTUNITIES AND SOLUTIONS FOR THE DIGITAL TRANSFORMATION OF THE TRANSPORT EDUCATION

Prof. Dr. Georgi Hristov, Assoc. Prof. Dr. Ivan Beloev, Assoc. Prof. Dr. Plamen Zahariev

Книжка 4
EFFECT OF RESILIENCE ON BURNOUT IN ONLINE LEARNING ENVIRONMENT

Dr. Radina Stoyanova, Prof. Sonya Karabeliova, Petya Pandurova, Dr. Nadezhda Zheckova Dr. Kaloyan Mitev

STATE AND PROSPECTS OF DEVELOPMENT OF ACADEMIC MOBILITY IN THE SYSTEM OF TRAINING A SPECIAL EDUCATION SPECIALIST

Dr. Tetiana Dokuchyna, Assoc. Prof., Prof. Dr. Svitlana Myronova, Dr. Tetiana Franchuk, Assoc. Prof.

Книжка 3s
STRATEGIES AND POLICIES TO SUPPORT THE DEVELOPMENT OF AI TECHNOLOGIES IN EUROPE

Assoc. Prof. Miglena Molhova, Assoc. Prof. Petya Biolcheva

BULGARIA'S TECHNOLOGICAL DEVELOPMENT THROUGH THE PRISM OF HIGHER EDUCATION POLICIES

Assoc. Prof. Ivaylo B. Ivanov, Assoc. Prof. Miglena Molhova

INTELLIGENT ANIMAL HUSBANDRY: FARMER ATTITUDES AND A ROADMAP FOR IMPLEMENTATION

Prof. Dr. Dimitrios Petropoulos, Koutroubis Fotios Assoc. Prof. Petya Biolcheva Evgeni Valchev

EFFECTIVE MANAGEMENT OF HUMAN RESOURCES IN TOURISM THROUGH MOTIVATION

Assoc. Prof. Fahri Idriz Assoc. Prof. Marin Geshkov

Книжка 3
САМООЦЕНКА НА ОБЩООБРАЗОВАТЕЛНИТЕ И РЕСУРСНИТЕ УЧИТЕЛИ ЗА РАБОТА В ПАРАДИГМАТА НА ПРИОБЩАВАЩОТО ОБРАЗОВАНИЕ

Проф. д.н. Милен Замфиров, проф. Емилия Евгениева, проф. Маргарита Бакрачева

STUDY OF THE DEVELOPMENT OF THE USE OF COMMUNICATIVE TECHNOLOGIES IN THE EDUCATIONAL PROCESS OF ENGINEERS TRAINING

Assoc. Prof. Ivan Beloev, Assoc. Prof. Valentina Vasileva Assoc. Prof. Sergii Bilan, Assoc. Prof. Maria Bondar, Assoc. Prof. Oksana Bulgakova, Assoc. Prof. Lyubov Shymko

SAFETY THROUGH ARTIFICIAL INTELLIGENCE IN THE MARITIME INDUSTRY

Assoc. Prof. Petya Biolcheva Evgeni Valchev, PhD student

Книжка 2
РАЗПОЛОЖЕНИЕ НА ВИСШИТЕ УЧИЛИЩА В БЪЛГАРИЯ В КОНТЕКСТА НА ФОРМИРАНЕ НА ПАЗАРА НА ТРУДА

Гл. ас. д-р Цветелина Берберова-Вълчева, доц. д-р Камен Петров, доц. д-р Николай Цонков

CHARACTERISTICS AND COMPONENTS OF THE CYBER HYGIENE AS A SUBCLASS OF CYBER SECURITY IN MILITARY ENVIRONMENT AND EDUCATIONAL ISSUES

Prof. Boyan Mednikarov, DSc. Prof. Yuliyan Tsonev Dr. Borislav Nikolov, Prof. Andon Lazarov, DSc.

Книжка 1
MODERNIZATION OF THE CONTENT OF THE LECTURE COURSE IN PHYSICS FOR TRAINING FUTURE AGRICULTURAL ENGINEERS

Dr. Ivan Beloev, Assoc. Prof., Dr. Valentina Vasileva, Assoc. Prof. Prof. Vasyl Shynkaruk, DSc., Assoc. Prof. Oksana Bulgakova, Assoc. Prof. Maria Bondar Assoc. Prof. Lesia Zbaravska, Assoc. Prof. Sergii Slobodian

THE NEW PANDEMIC NORMAL THROUGH THE EYES OF BULGARIAN STUDENTS

Prof. Vyara Stoilova, Assoc. Prof. Todorka Kineva

2022 година
Книжка 6
ORGANIZATION OF AN INCLUSIVE EDUCATIONAL ENVIRONMENT FOR THE STUDENTS WITH SPECIAL NEEDS

Prof. Halyna Bilavych Prof. Nataliia Bakhmat Prof. Tetyana Pantiuk, Prof. Mykola Pantiuk Prof. Borys Savchuk

ДИГИТАЛИЗАЦИЯ НА ОБРАЗОВАНИЕТО В БЪЛГАРИЯ: СЪСТОЯНИЕ И ОБЩИ ТЕНДЕНЦИИ

Д-р Теодора Върбанова, проф. д-р Албена Вуцова, доц. д-р Николай Нетов

СКРИНИНГ НА ЗРЕНИЕТО – ПРОФИЛАКТИКА И ЕЛЕМЕНТ ОТ ПРАКТИКАТА НА СТУДЕНТИ И ОБУЧЕНИЕТО НА УЧЕНИЦИ

Руска Драганова-Христова, д-р Славена Стойкова, доц. д-р Снежана Йорданова

Книжка 5
ПРАВОТО НА ИЗБОР В ЖИВОТА НА ДЕЦАТА В РЕПУБЛИКА БЪЛГАРИЯ

Проф. д.п.н. Сийка Чавдарова-Костова, гл. ас. д-р Даниела Рачева, ас. Екатерина Томова, доц. д-р Росица Симеонова

SUSTAINABLE PROFESSIONAL DEVELOPMENT THROUGH COACHING: BENEFITS FOR TEACHERS AND LEARNERS

Assoc. Prof. Irina Ivanova, Assoc. Prof. Penka Kozhuharova, Prof. Rumyana Todorova

SELF-ASSESSMENT – A COMPONENT OF THE COMPETENCE-BASED TRAINING IN THE PROFESSION “APPLIED PROGRAMMER”

Assoc. Prof. Ivaylo Staribratov, Muharem Mollov, Rosen Valchev Petar Petrov

Книжка 4
BENCHMARKING FOR DEVELOPMENT OF SPEED AND POWER CHARACTERISTICS

Assist. Prof. Dr. Darinka Ignatova Assoc. Prof. Dr. Alexander Iliev

DIAGNOSIS AS A TOOL FOR MONITORING THE EFFECTIVENESS OF ADDICTION PREVENTION IN ADOLESCENTS

Prof. O.A. Selivanova Assoc. Prof. N.V. Bystrova, Assoc. Prof. I.I. Derecha, Assoc. Prof. T.S. Mamontova, Assoc. Prof. O.V. Panfilova

Книжка 3
ПУБЛИЧНОТО РАЗБИРАНЕ НА НАУКАТА В МРЕЖОВИЯ СВЯТ

Д-р Светломир Здравков, д-р Мартин Й. Иванов, д-р Петя Климентова

ОБРАЗОВАНИЕ ЗА УСТОЙЧИВО РАЗВИТИЕ – ПРАКТИКО-ПРИЛОЖНИ АСПЕКТИ

Гл. ас. д-р Златка Ваклева Проф. д-р Тоня Георгиева

Книжка 2
PREPARATION OF PRIMARY SCHOOL TEACHERS FOR COMMUNICATIVE AND RHETORICAL ACTIVITY IN SCHOOL IN THE CONTEXT OF THEIR PRACTICAL TRAINING

Prof. Halyna Bilavych Prof. Nataliia Bakhmat Prof. Tetyana Pantyuk, Prof. Mykola Pantyuk Prof. Borys Savchuk

ПРОЛЕТНА КОНФЕРЕНЦИЯ НА СЪЮЗА НА МАТЕМАТИЦИТЕ В БЪЛГАРИЯ

(Трявна, 5 – 9 април 2022) Гл. ас. д-р Албена Симова

Книжка 1
ДИГИТАЛНАТА ИНТЕРАКЦИЯ ПРЕПОДАВАТЕЛ – СТУДЕНТ В ОНЛАЙН ОБУЧЕНИЕТО В МЕДИЦИНСКИТЕ УНИВЕРСИТЕТИ

Д-р Миглена Търновска, д-р Румяна Стоянова Доц. Боряна Парашкевова, проф. Юлияна Маринова

2021 година
Книжка 6
Книжка 5
ЕДНА РЕКАПИТУЛАЦИЯ НА ИЗСЛЕДВАНИЯ ВЪРХУ ИНТЕРКУЛТУРНИТЕ ОТНОШЕНИЯ. КАКВО СЛЕДВА ОТ ТОВА ЗА ОБРАЗОВАНИЕТО?

Давидков, Ц., 2019. Изследвания върху културите. Културни ориентири на управлението. София: СУ „Св. Климент Охридски“, ISBN 978-954-9399-52-3 Проф. Пламен Макариев

Книжка 4s
RECOGNITION OF FAKE NEWS IN SPORTS

Colonel Assoc. Prof. Petko Dimov

SIGNAL FOR HELP

Ina Vladova, Milena Kuleva

Книжка 4
PREMISES FOR A MULTICULTURAL APPROACH TO EDUCATION

Dr. Anzhelina Koriakina, Assoc. Prof., Prof. Lyudmila Amanbaeva, DSc.

ПОЗИТИВНА ПСИХОЛОГИЯ: ПРОБЛЕМНИ ОБЛАСТИ И ФОРМИРАНЕ НА ЛИЧНОСТТА

Доц. д-р Стоил Мавродиев, Любомира Димитрова

КНИГА ЗА ИСТОРИЯТА НА БЪЛГАРСКОТО ВИСШЕ ИНЖЕНЕРНО ОБРАЗОВАНИЕ

Сгурев, В., Гергов, С., Иванов, Г., 2019. Положителните науки с приложение към индустрията. История на висшето техническо образование в България. София: Изд. на БАН „Проф. Марин Дринов“, Изд. „Захарий Стоянов“. ISBN 978-619-245-004-5, ISBN 978-954-09-1387-2.

Книжка 3
ENTREPRENEURSHIP AND INTERDISCIPLINARY EDUCATION – SEMIOTIC ASPECTS

Prof. Dr. Christo Kaftandjiev Dr. Diana Kotova

THE PRACTICAL IMPORTANCE OF ACCOUNTING EDUCATION FOR FUTURE MANAGERS

Nataliia Radionova, DSc. Dr. Radostina Stoyanova, Assist. Prof.

ЗА ОБРАЗОВАТЕЛНАТА ИНТЕГРАЦИЯ И ЗАЛОЗИТЕ НА НАСТОЯЩЕТО

Нунев, Й., 2020. Мониторинг на процесите на приобщаване и образователна интеграция и модели за десегрегация на ромското образование. Пловдив: Астарта, ISBN 978-954-350-283-7

Книжка 2
Книжка 1
METHODOLOGY OF SAFETY AND QUALITY OF LIFE ON THE BASIS OF NOOSPHERIC EDUCATION SYSTEM FORMATION

Nataliia Bakhmat Nataliia Ridei, Nataliia Tytova, Vladyslava Liubarets, Oksana Katsero

ОБРАЗОВАНИЕ В УСТОЙЧИВО РАЗВИТИЕ И ВЗАИМОДЕЙСТВИЕ „ДЕТЕ – СРЕДА“

Стоянова, М. (2020). Образование в устойчиво развитие и взаимодействие „дете – среда“ София: Авангард принт. ISBN 978-954-337-408-3

2020 година
Книжка 6
HIGHER EDUCATION AS A PUBLIC GOOD

Yulia Nedelcheva, Miroslav Nedelchev

Книжка 5
НАСЪРЧАВАНЕ НА СЪТРУДНИЧЕСТВОТО МЕЖДУ ВИСШИТЕ УЧИЛИЩА И БИЗНЕСА

Добринка Стоянова, Блага Маджурова, Гергана Димитрова, Стефан Райчев

Книжка 4
THE STRATEGY OF HUMAN RIGHTS STUDY IN EDUCATION

Anush Balian Nataliya Seysebayeva Natalia Efremova Liliia Danylchenko

Книжка 3
ПОМОЩНИ СРЕДСТВА И ТЕХНОЛОГИИ В ПРИОБЩАВАЩОТО ОБРАЗОВАНИЕ

Янкова, Ж. (2020). Помощни средства и технологии за деца и ученици със специални образователни потребности в приобщаващото образование.

Книжка 2
МИГРАЦИЯ И МИГРАЦИОННИ ПРОЦЕСИ

Веселина Р. Иванова

SOCIAL STATUS OF DISABLED PEOPLE IN RUSSIA

Elena G. Pankova, Tatiana V. Soloveva, Dinara A. Bistyaykina, Olga M. Lizina

Книжка 1
ETHNIC UPBRINGING AS A PART OF THE ETHNIC CULTURE

Sholpankulova Gulnar Kenesbekovna

ЗА СВЕТЛИНАТА, КОЯТО ИЗЛЪЧВА… В ПАМЕТ НА ПРОФ. Д.П.Н. АСЕМГУЛ МАЛДАЖАНОВА

Нашата редколегия загуби един все- отдаен и неповторим колега и приятел – проф. д.п.н. Асемгул Малдажанова. Пе- дагог по призвание и филолог по мисия! Отиде си от нас нашият приятел, коле- га и член на редколегията на списанието – професор д.п.н. Асемгул Малдажанова – първи заместник-ректор на Евразийския

2019 година
Книжка 6
EMOTIONAL COMPETENCE OF THE SOCIAL TEACHER

Kadisha K. Shalgynbayeva Ulbosin Zh.Tuyakova

Книжка 5
„ОБРАЗОВАТЕЛНИ КИНОХОРИЗОНТИ“ В ПОЛЕТО НА МЕДИА ОБРАЗОВАНИЕТО

(2018). Образователни кинохоризонти. Международен сборник с научни публи- кации по проект „Естетически и образователни проекции на кинодидактиката“. Бургас: Проф. д-р Асен Златаров. Съставител: Маргарита Терзиева. ISBN 978-954-471-496-3

Книжка 4
ВИСШЕТО МОРСКО ОБРАЗОВАНИЕ В КОНКУРЕНТНА СРЕДА

Бакалов, Я. (2019). Висше морско образование. Лидиране в конкурентна среда. Варна: Стено. ISBN 978-619-241-029-2

Книжка 3
УЧИЛИЩЕТО НА БЪДЕЩЕТО

Наталия Витанова

Книжка 2
КНИГА ЗА УСПЕШНИТЕ НАУЧНИ ПУБЛИКАЦИИ

Кожухаров, А. (2018). Успешните научни публикации. Варна: Тера Балканика. ISBN 978-619-90844-1-0

Книжка 1
POST-GRADUATE QUALIFICATION OF TEACHERS IN INTERCULTURAL EDUCATIONAL ENVIRONMENT

Irina Koleva, Veselin Tepavicharov, Violeta Kotseva, Kremena Yordanova

ДЕЦАТА В КОНСТИТУЦИОННИТЕ НОРМИ НА БЪЛГАРИЯ

Румен Василев, Весела Марева

СЪСТОЯНИЕ НА БЪЛГАРСКОТО ОБРАЗОВАНИЕ

Анелия Любенова Любомир Любенов

ИНТЕРКУЛТУРНИЯТ ТРЕНИНГ КАТО ЧАСТ ОТ СТРАТЕГИЯТА ЗА ГЛОБАЛИЗАЦИОННА ИНТЕГРАЦИЯ

Хубенова, М. (2018). Значение на междукултурната комуникация за направления: политически науки, право, икономика и бизнес. София: Издателски комплекс УНСС. ISBN 978-619-232-072-0

ЕДИН НОВ УЧЕБНИК

Дончева, Ю. (2018). Теоретични и методически основи на запознаване с околния свят в детската градина. Русе: Лени Ан

2018 година
Книжка 6
СТРАТЕГИИ НА ОБРАЗОВАТЕЛНАТА И НАУЧНАТА ПОЛИТИКА НАУЧНО СПИСАНИЕ STRATEGIES FOR POLICY IN SCIENCE AND EDUCATION EDUCATIONAL JOURNAL ГОДИНА XXVI / VOLUME 26, 2018 ANNUAL CONTENTS / ГОДИШНО СЪДЪРЖАНИЕ СТРАНИЦИ / PAGES КНИЖКА 1 / NUMBER 1: 1 – 120 КНИЖКА 2 / NUMBER 2: 121 – 224 КНИЖКА 3 / NUMBER 3: 225 – 336 КНИЖКА 4 / NUMBER 4: 337 – 448 КНИЖКА 5 / NUMBER 5: 449 – 560 КНИЖКА 6 / NUMBER 6: 561 – 664

ДИСКУСИОННО / DISCUSSION 211 – 216: Процедурата за назначаване на ръководител на катедра като причина за вло- шаващото се качество на обучението и микроклимата във висшите учи лища у нас [The Procedure for Appointing a Head of Department as a Reason for the Deteriorating Quality of Education and the Microclimate in the Higher School] / Александър Димит- ров / Alexander Dimitrov

Книжка 5
A NEW AWARD FOR PROFESSOR MAIRA KABAKOVA

The staff of the Editorial board of the journal “Strategies for Policy in Science and Education” warmly and sincerely congratulates their Kazakhstan colleague -

ПРОДЪЛЖАВАЩАТА КВАЛИФИКАЦИЯ НА УЧИТЕЛИТЕ – НОРМАТИВЕН И ИЗСЛЕДОВАТЕЛСКИ ОБЗОР

(научно-теоретично обобщение върху проведени обучения на учители)

ЕТНОЦЕНТРИЗМЪТ И ИНЕРЦИИТЕ ОТ МИНАЛОТО – СЕРИОЗНИ ПРОБЛЕМИ В БЪЛГАРСКАТА ОБРАЗОВАТЕЛНА СИСТЕМА

(Eтнопедагогически аспекти на основното и средното образование) Веселин Тепавичаров

Книжка 4
ХРИСТО БОТЕВ И ПОЗНАВАТЕЛНИЯТ КРЪГОЗОР НА СЪВРЕМЕННИТЕ СТУДЕНТИ ЗА ЕВРОПА

Изследователски разказ за един познавателен подвиг и за една познавателна недостатъчност

Книжка 3
BLENDED EDUCATION IN HIGHER SCHOOLS: NEW NETWORKS AND MEDIATORS

Nikolay Tsankov Veska Gyuviyska Milena Levunlieva

ВЗАИМОВРЪЗКАТА МЕЖДУ СПОРТА И ПРАВОТО

Ивайло Прокопов, Елица Стоянова

НАДНАЦИОНАЛНИ И МЕЖДУПРАВИТЕЛСТВЕНИ МЕТОДИ НА ИНТЕГРАЦИЯ В ОБЛАСТТА НА ПРАВОСЪДИЕТО И СИГУРНОСТТА

(Формиране на обща миграционна политика: парадигми и образователни аспекти) Лора Махлелиева-Кларксън

Книжка 2
Книжка 1
ВЪЗПРИЯТИЯ И НАГЛАСИ НА УЧЕНИЦИТЕ ПО ВАЖНИ ОБЩЕСТВЕНИ ВЪПРОСИ

(Данни от Международното изследване на гражданското образование – ICCS 2016)

2017 година
Книжка 6
ЗНАЧИМОСТТА НА УЧЕНЕТО: АНАЛИЗ НА ВРЪЗКИТЕ МЕЖДУ ГЛЕДНИТЕ ТОЧКИ НА УЧЕНИЦИ, РОДИТЕЛИ И УЧИТЕЛИ

Илиана Мирчева, Елена Джамбазова, Снежана Радева, Деян Велковски

ВЪЗПРИЯТИЯ И НАГЛАСИ НА УЧЕНИЦИТЕ ПО ВАЖНИ ОБЩЕСТВЕНИ ВЪПРОСИ

(Данни от Международното изследване на гражданското образование – ICCS 2016)

СТРАТЕГИИ НА ОБРАЗОВАТЕЛНАТА И НАУЧНАТА ПОЛИТИКА НАУЧНО СПИСАНИЕ STRATEGIES FOR POLICY IN SCIENCE AND EDUCATION EDUCATIONAL JOURNAL ГОДИНА XXV / VOLUME 25, 2017 ANNUAL CONTENTS / ГОДИШНО СЪДЪРЖАНИЕ

СТРАНИЦИ / PAGES КНИЖКА 1 / NUMBER 1: 1 – 112 КНИЖКА 2 / NUMBER 2: 113 – 224 КНИЖКА 3 / NUMBER 3: 225 – 336 КНИЖКА 4 / NUMBER 4: 337 – 448 КНИЖКА 5 / NUMBER 5: 449 – 552 КНИЖКА 6 / NUMBER 6: 553 – 672

Книжка 5
ОРГАНИЗАЦИОННА КУЛТУРА В УЧИЛИЩЕ

Ивайло Старибратов, Лилия Бабакова

Книжка 4
КОУЧИНГ. ОБРАЗОВАТЕЛЕН КОУЧИНГ

Наталия Витанова, Нели Митева

Книжка 3
ТЕХНОХУМАНИЗМЪТ И ДЕЙТЪИЗМЪТ – НОВИТЕ РЕЛИГИИ НА БЪДЕЩЕТО

Harari, Y. N. (2016). Homo Deus. A Brief History of Tomorrow. Harvill Secker. ISBN-10: 1910701874

Книжка 2
Книжка 1
РЕФОРМИТЕ В ОБРАЗОВАНИЕТО – ПЕРСПЕКТИВИ И ПРЕДИЗВИКАТЕЛСТВА

Интервю с Габриела Миткова, началник на Регионалното управление на образованието – Силистра

ЕМПАТИЯ И РЕФЛЕКСИЯ

Нели Кънева, Кристиана Булдеева

2016 година
Книжка 6
СТРАТЕГИИ НА ОБРАЗОВАТЕЛНАТА И НАУЧНАТА ПОЛИТИКА НАУЧНО СПИСАНИЕ STRATEGIES FOR POLICY IN SCIENCE AND EDUCATION EDUCATIONAL JOURNAL ГОДИНА XXIV / VOLUME 24, 2016 ANNUAL CONTENT / ГОДИШНО СЪДЪРЖАНИЕ

СТРАНИЦИ / PAGES КНИЖКА 1 / NUMBER 1: 1 – 120 КНИЖКА 2 / NUMBER 2: 121 – 232 КНИЖКА 3 / NUMBER 3: 233 – 344 КНИЖКА 4 / NUMBER 4: 345 – 456 КНИЖКА 5 / NUMBER 5: 457 – 568 КНИЖКА 6 / NUMBER 6: 569 – 672

Книжка 5
Книжка 4
Книжка 3
Книжка 2
Книжка 1
2014 година
Книжка 6
Книжка 5
КОХЕРЕНТНОСТ НА ПОЛИТИКИ

Албена Вуцова, Лиляна Павлова

Книжка 4
ОБРАЗОВАНИЕТО ПО ПРАВАТА НА ЧОВЕКА ПРЕЗ ПОГЛЕДА НА ДОЦ. ЦЕЦКА КОЛАРОВА

Цецка Коларова. (2013). Образование по правата на човека. София: Авангард Прима. ISBN 978-619-160-234-6

USING THE RESULTS OF A NATIONAL ASSESSMENT OF EDUCATIONAL ACHIEVEMENT

Thomas Kellaghan Vincent Greaney T. Scott Murray Chapter 4 Translating Assessment Findings Into Policy And Action Although the primary purpose of a system of national assessment is to describe students’ learning, its role is not limited to description. To justify the effort and expenditure involved, the information that an assessment provides about the achievements of students, their strengths and weaknesses, and how they are distributed in the population (for example, by gender or location

Книжка 3
Книжка 2
PROFESSIONAL DEVELOPMENT OF UNIVERSITY FACULTY: А SOCIOLOGICAL ANALYSIS

Gulnar Toltaevna Balakayeva Alken Shugaybekovich Tokmagambetov Sapar Imangalievich Ospanov

ЗА ПО-ХУМАНИСТИЧНА ТРАДИЦИОННО- ИНОВАЦИОННА ОБРАЗОВАТЕЛНО-ВЪЗПИТАТЕЛНА СТРАТЕГИЯ У НАС

(КОНЦЕПТУАЛНА РАЗРАБОТКА В ПОМОЩ НА ПОДГОТОВКАТА НА НОВ ЗАКОН ЗА ОБРАЗОВАНИЕТО)

Книжка 1
РЕФЛЕКСИЯТА В ИНТЕГРАТИВНОТО ПОЛЕ НА МЕТОДИКАТА НА ОБУЧЕНИЕТО ПО БИОЛОГИЯ

Иса Хаджиали, Наташа Цанова, Надежда Райчева, Снежана Томова

USING THE RESULTS OF A NATIONAL ASSESSMENT OF EDUCATIONAL ACHIEVEMENT

Thomas Kellaghan Vincent Greaney T. Scott Murray Chapter 1 Factors affecting the use and nonuse of national assessment fi ndings The main objectives of a national assessment, as set out in volume 1 of this series, Assessing National Achievement Levels in Education, are to determine (a) how well students are learning in the education system (with reference to general expectations, aims of the curriculum, and preparation for further learning and for life); (b) whether there is evidence of par

2013 година
Книжка 6
Книжка 5
Книжка 4
QUESTIONNAIRE DEVELOPMENT

ÎÖÅÍßÂÀÍÅÒÎ

РОССИЙСКАЯ СИСТЕМА ОЦЕНКИ КАЧЕСТВА ОБРАЗОВАНИЯ: ГЛАВНЫЕ УРОКИ

В. Болотов / И. Вальдман / Г. Ковалёва / М. Пинская

Книжка 3
MASS MEDIA CULTURE IN KAZAKHSTAN

Aktolkyn Kulsariyeva Yerkin Massanov Indira Alibayeva

РОССИЙСКАЯ СИСТЕМА ОЦЕНКИ КАЧЕСТВА ОБРАЗОВАНИЯ: ГЛАВНЫЕ УРОКИ

В. Болотов / И. Вальдман / Г. Ковалёва / М. Пинская

Книжка 2
ОЦЕНЯВАНЕ НА ГРАЖДАНСКИТЕ КОМПЕТЕНТНОСТИ НА УЧЕНИЦИТЕ: ПРЕДИЗВИКАТЕЛСТВА И ВЪЗМОЖНОСТИ

Светла Петрова Център за контрол и оценка на качеството на училищното образование

Книжка 1
Уважаеми читатели,

вет, както и от международния борд за предоставените статии и студии, за да могат да бъдат идентифицирани в полето на образованието пред широката аудитория от педа- гогически специалисти във всички степени на образователната ни система. Благодаря за техния всеотдаен и безвъзмезден труд да създават и популяризират мрежа от научни съобщества по профила на списанието и да насърчават научните изследвания. Благодаря на рецензентите от национално представените висши училища, на- учни институции и

METHODS FOR SETTING CUT SCORES IN CRITERION – REFERENCED ACHIEVEMENT TESTS

ÎÖÅÍßÂÀÍÅÒÎ COMPARATIVE ANALYSIS OF THE QUALITY OF THE SEPARATE METHODS

ПУБЛИКАЦИИ ПРЕЗ 2012 Г.

СПИСАНИЕ „БЪЛГАРСКИ ЕЗИК И ЛИТЕРАТУРА“

2012 година
Книжка 6
DEVELOPMENT OF SCIENCE IN KAZAKHSTAN IN THE PERIOD OF INDEPENDENCE

Aigerim Mynbayeva Maira Kabakova Aliya Massalimova

Книжка 5
Книжка 4
Книжка 3
СИСТЕМАТА ЗА РАЗВИТИЕ НА АКАДЕМИЧНИЯ СЪСТАВ НА РУСЕНСКИЯ УНИВЕРСИТЕТ „АНГЕЛ КЪНЧЕВ“

Христо Белоев, Ангел Смрикаров, Орлин Петров, Анелия Иванова, Галина Иванова

Книжка 2
ПРОУЧВАНЕ НА РОДИТЕЛСКОТО УЧАСТИЕ В УЧИЛИЩНИЯ ЖИВОТ В БЪЛГАРИЯ

* Този материал е изготвен въз основа на резултатите от изследването „Parental Involvement in Life of School Matters“, проведено в България в рамките на проек- та „Advancing Educational Inclusion and Quality in South East Europe“, изпълняван

ВТОРИ ФОРУМ ЗА СТРАТЕГИИ В НАУКАТА

Тошка Борисова В края на 2011 г. в София се проведе второто издание на Форум за страте- гии в науката. Основната тема бе повишаване на международната видимост и разпознаваемост на българската наука. Форумът се организира от „Elsevier“ – водеща компания за разработване и предоставяне на научни, технически и медицински информационни продукти и услуги , с подкрепата на Министер- ството на образованието, младежта и науката. След успеха на първото издание на Форума за стратегии в науката през

Книжка 1
РЕЙТИНГИ, ИНДЕКСИ, ПАРИ

Боян Захариев