1. Stošić, L., Veličković, D.: Computer security and security technologies. J. Process Manag. New Technol. 1(1), 14–19 (2013)
2. Hui, H., Zhou, C., Xu, S., Lin, F.: A novel secure data transmission scheme in industrial internet of things. China Commun. 17(1), 73–88 (2020)
3. Omari, A.H., Al-Kasasbeh, B.M., Al-Qutaish, R.E., & Muhairat, M.I.: A new cryptographic algorithm for the real time applications. In: Proceedings of the 7th International Conference on Information Security and Privacy-(ISP’08), Cairo, Egypt, from Dec (Vol. 29). (2008)
4. Čitavičius, A., Jonavičius, A., Japertas, S.: Unpredictable cryptographic pseudo-random number generator based on non-linear dynamic chaotic system. Elektronika ir Elektrotechnika 79(7), 29–32 (2007)
5. Zhen, W., Xia, H., Ning, L., Xiao-Na, S.: Image encryption based on a delayed fractional-order chaotic logistic system. Chin. Phys. B 21(5), 050506 (2012)