References
- Hasan, M. K., S. Muhammad, S. Islam, B. Pandey, Y. A. Baker El-Ebiary, N. S. Nafi, R. C. Rodriguez, D. E. Vargas. Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications. – Complexity, 2021.
- Wu, L., H. Cai. Novel Stream Ciphering Algorithm for Big Data Images Using Zeckendorf Representation. – Wireless Communications and Mobile Computing, 2021.
- Megala, G., P. Swarnalatha. Efficient High-End Video Data Privacy Preservation with Integrity Verification in Cloud Storage. – Computers and Electrical Engineering, Vol. 102, 2022, 108226.
- Subramanian, A. K., A. Samanta, S. Manickam, A. Kumar, S. Shiaeles, A. Mahendran. Linear Regression Trust Management System for IoT Systems. – Cybernetics and Information Technologies, Vol. 21, 2021, No 4, pp.15-27.
- Poonam, J., B. Singh. RC4 Encryption-A Literature Survey. – Procedia Computer Science, Vol. 46, 2015, pp. 697-705.
- Zhang, S., S. Wang, G. Bai, M. Zhang, P. Chen, C. Zhao, S. Li, J. Zhou. Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution. – Wireless Communications and Mobile Computing, 2022.
- Nastov, B., F. Pfister. Experimentation of a Graphical Concrete Syntax Generator for Domain Specific Modeling Languages. – In: Proc. of Conference: INFORSID, 2014, France.
- Sudeepa, K. B., G. Aithal, V. Rajinikanth, S. C. Satapathy. Genetic Algorithm Based Key Sequence Generation for Cipher System. – Pattern Recognition Letters, Vol. 133, 2020, pp. 341-348.
- Mengdi, Z., Z. Xiaojuan, Z. Yayun, M. Siwei. Overview of Randomness Test on Cryptographic Algorithms. – In: Journal of Physics: Conference Series, Vol. 1861, No 1, 012009. IOP Publishing, 2021.
- Abd, E.-L., A. Ahmed, A.-E.-A. Bassem, S. E. Venegas-Andraca. Controlled Alternate Quantum Walk-Based Pseudo-Random Number Generator and Its Application to Quantum Color Image Encryption. – Physica A: Statistical Mechanics and Its Applications, Vol. 547, 2020, 123869.
- Karakaya, B., A. Gü n, M. Frasca. A True Random Bit Generator Based on a Memristive Chaotic Circuit: Analysis, Design and FPGA Implementation. – Chaos, Solitons & Fractals, Vol. 119, 2019, pp. 143-149.
- Lozanovski, B., D. Downing, P. Tran, D. Shidid, M. Qian, P. Choong, M. Brandt, M. Leary. A Monte Carlo Simulation-Based Approach to Realistic Modelling of Additively Manufactured Lattice Structures. – Additive Manufacturing, Vol. 32, 2020, 101092.
- Kordov, K., G. Dimitrov. A New Symmetric Digital Video Encryption Model. – Cybernetics and Information Technologies, Vol. 21, 2021, No 1, pp. 50-61.
- Zhong, J., D. Lin. Decomposition of Nonlinear Feedback Shift Registers Based on Boolean Networks. – Science China Information Sciences, Vol. 62, 2019, No 3, pp. 1-3.
- Jiao, L., Y. Hao, D. Feng. Stream Cipher Designs: A Review. – Science China Information Sciences, Vol. 63, 2020, No 3, pp. 1-25.
- Deb, S., B. Bhuyan. Performance Analysis of Current Lightweight Stream Ciphers for Constrained Environments. – ād ā, Vol. 45, 2020, No 1, pp. 1-12.
- Qasaimeh, M., R. S. Al-Qassas, S. Tedmori. Software Randomness Analysis and Evaluation of Lightweight Ciphers: The Prospective for IoT Security. – Multimedia Tools and Applications, Vol. 77, 2018, No 14, pp. 18415-18449.
- Lazarov, A. D., P. Petrova. Modelling Activity of a Malicious User in Computer Networks. – Cybernetics and Information Technologies, Vol. 22, 2022, No 2, pp. 86-95.
- Shen, L., X. Chen, R. Liu, H. Wang, G. Ji. Domain-Specific Language Techniques for Visual Computing: A Comprehensive Study. – Archives of Computational Methods in Engineering, Vol. 28, 2021, No 4, pp. 3113-3134.
- Handzhiyski, N., E. Somov . P ’ L x . – Cybernetics and Information Technologies, Vol. 22, 2022, No 2, pp. 125-144.
- Boytcheva, S. Overview of Inductive Logic Programming (ILP) Systems. – Cybernetics and Information Technologies, Vol. 2, 2002, No 1, pp. 27-36.
- Challenger, M., B. T. Tezel, V. Amaral, M. Goulao, G. Kardas. Agent-Based Cyber-Physical System Development with Sea_ml++. – In: Multi-Paradigm Modelling Approaches for Cyber-Physical Systems. Elsevier, 2021, pp. 195-219.
- Mosteller, D., M. Haustermann, D. Moldt, D. Schmitz. Integrated Simulation of Domain-Specific Modeling Languages with Petri Net-Based Transformational Semantics. – In: Transactions on Petri Nets and Other Models of Concurrency XIV. Berlin, Heidelberg, Springer, 2019, pp. 101-125.
- Shekhovtsov, V. A., S. Ranasinghe, H. C. Mayr, J. Michael. Domain Specific Models as System Links. – In: Proc. of International Conference on Conceptual Modeling, Cham, Springer, 2018, pp. 330-340.
- Elaheh, A. M., A. M. Elham, C. Moharram. DSML4CP: A Domain-Specific Modeling Language for Concurrent Programming. – Computer Languages, Systems & Structures, Vol. 44, 2015, pp. 319-341.
- Juan, B.-P., O. Guadalupe, M.-B. Inmaculada. ModeL4CEP: Graphical Domain-Specific Modeling Languages for CEP Domains and Event Pattern. – Expert Systems with Applications,Vol. 42, 30 November 2015, Issue 21, pp. 8095-8110.
- Campos, C., R. Grangel. A Domain-Specific Modelling Language for Corporate Social Responsibility (CSR). – Computers in Industry, Vol. 97, 2018, pp. 97-110.
- Chunlin, G., Y. Ao, D. Du, F. Mallet. XSHS: An Executable Domain-Specific Modeling Language for Modeling Stochastic and Hybrid Behaviors of Cyber-Physical Systems. – In: Proc. of 25th Asia-Pacific Software Engineering Conference (APSEC’18), IEEE, 2018, pp. 683-687.
- Marzina, V., T. Massoni, F. Ramalho. A Domain-Specific Language for Verifying Software Requirement Constraints. – Science of Computer Programming, Vol. 197, 1 October 2020, 102509.
- Sadik, A., K. Geylani. DSML4DT: A Domain-Specific Modeling Language for Device Tree Software. – Computers in Industry, Vol. 115, 2020, 103179.
- Ana, P. S., S. Babarogić, O. Pantelić, . Krstović. Towards a Domain-Specific Modeling Language for Extracting Event Logs from ERP Systems. – Applied Sciences, Vol. 11, 2021, No 12, 5476.
- Rukhin, A., J. Soto, J. Nechvatal, E. Barker, S. Leigh, M. Levenson, D. Banks et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. – NIST Special Publication, 800-22 (revised 15 May 2002).
- Kiper, J. D., E. Howard, C. Ames. Criteria for Evaluation of Visual Programming Languages. – Journal of Visual Languages & Computing, Vol. 8, 1997, No 2, pp. 175-192.
