Publisher
Springer Nature Switzerland
Reference9 articles.
1. Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)
2. Kostadinov, G., Atanasova, T.: Security policies for wireless and network infrastructure. Prob. Eng. Cybern. Rob. 71, 14–19 (2019)
3. Dineva, K.; Atanasova, T.: Security in IoT systems. In: 19th International Multidisciplinary Scientific GeoConference SGEM 2019, book 2.1, pp. 569–578 (2019)
4. Pseudo-Random Number Generators. https://crypto.stanford.edu/pbc/notes/crypto/prng.html
5. Blagoev, I.: Method for evaluating the vulnerability of random number generators for cryptographic protection in information systems. In: Dimov, I., Fidanova, S. (eds.) Advances in High Performance Computing: Results of the International Conference on “High Performance Computing” Borovets, Bulgaria, 2019, pp. 391–397. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-55347-0_33