Abdoun, N., El Assad, S., Taha, M.A., Assaf, R., Deforges, O. and Khalil, M. (2016). Secure hash algorithm based on efficient chaotic neural network, 2016 International Conference on Communications (COMM), Bucharest, Romania, pp. 405–410.
Aggarwal, K. and Verma, H.K. (2015). Hash RC6—variable length hash algorithm using RC6, 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India, pp. 450–456.
Al-Hamdani, W.A. (2011). Elliptic curve for data protection, Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD’11, New York, USA, pp. 1–14.
Barbierato, E., Gribaudo, M., Iacono, M. and Jakóbik, A. (2019). Exploiting CloudSim in a multiformalism modeling approach for cloud based systems, Simulation Modelling Practice and Theory93: 133–147.10.1016/j.simpat.2018.09.018
Bellare, M. and Kohno, T. (2004). Hash function balance and its impact on birthday attacks, in C. Cachin and J.L. Camenisch (Eds), Advances in Cryptology, EUROCRYPT 2004, Springer, Berlin, pp. 401–418.10.1007/978-3-540-24676-3_24
Chugunkov, I.V., Ivanov, M.A. and Kliuchnikova, B.V. (2019). Hash functions are based on three-dimensional stochastic transformations, 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Saint Petersburg/Moscow, Russia, pp. 202–205.
Du, Y., He, G. and Yu, D. (2016). Efficient hashing technique based on bloom filter for high-speed network, 8th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Hangzhou, China, Vol. 01, pp. 58–63.
Dworkin, M.J. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf.
Fernandez-Cerero, D., Jakóbik, A., Grzonka, D., Kołodziej, J. and Fernandez-Montes, A. (2018). Security supportive energy-aware scheduling and energy policies for cloud environments, Journal of Parallel and Distributed Computing119: 191–202.10.1016/j.jpdc.2018.04.015
Fernandez-Cerero, D., Fernandez-Montes, A., Jakóbik, A., Kołodziej, J. and Toro, M. (2018). SCORE: Simulator for cloud optimization of resources and energy consumption, Simulation Modelling Practice and Theory82: 160–173.10.1016/j.simpat.2018.01.004
Gholipour, A., Araabi, B.N. and Lucas, C. (2006). Predicting chaotic time series using neural and neurofuzzy models: A comparative study, Neural Processing Letters24(3): 217–239.10.1007/s11063-006-9021-x
Grzonka, D. (2018). Intelligent Agent-based Monitoring Systems of Task Scheduling for Distributed High-Performance Environments, PhD thesis, Polish Academy of Sciences, Warsaw.
Grzonka, D., Jakóbik, A., Kołodziej, J. and Pllana, S. (2018). Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security, Future Generation Computer Systems86: 1106–1117.10.1016/j.future.2017.05.046
Huang, W. and Wang, L. (2019). A hash function based on sponge structure with chaotic map for spinal codes, 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), Beijing, China, pp. 1–5.
ISO/IEC (2005). Information Technology—Security Techniques—Code of Practice for Information Security Management, ISO/IEC 27002:2005, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://www.iso.org/standard/50297.html.
ISO/IEC (2015). Information Technology—Security Techniques—Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services, ISO/IEC 27017:2015, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://www.iso.org/standard/43757.html.
Jakóbik, A. (2016). Big data security, in F. Pop et al. (Eds), Resource Management for Big Data Platforms: Algorithms, Modelling, and High-Performance Computing Techniques, Springer, Cham, pp. 241–261, DOI: 10.1007/978-3-319-44881-7_12.10.1007/978-3-319-44881-7_12
Jakóbik, A., Grzonka, D. and Kołodziej, J. (2017a). Security supportive energy aware scheduling and scaling for cloud environments, European Conference on Modelling and Simulation, ECMS 2017, Budapest, Hungary, pp. 583–590.
Jakóbik, A., Grzonka, D. and Palmieri, F. (2017b). Non-deterministic security driven meta scheduler for distributed cloud organizations, Simulation Modelling Practice and Theory76: 67–81.10.1016/j.simpat.2016.10.011
Jakóbik, A., Grzonka, D., Kołodziej, J. and González-Vélez, H. (2016). Towards secure non-deterministic meta-scheduling for clouds, 30th European Conference on Modelling and Simulation, ECMS 2016, Regensburg, Germany, pp. 596–602, DOI: 10.7148/2016-0596.10.7148/2016-0596
Jakóbik, A. and Wilczynski, A. (2017). Using polymatrix extensive Stackelberg games in security-aware resource allocation and task scheduling in computational clouds, Journal of Telecommunications and Information Technology1: 71–80.
Jankowski, N. and Linowiecki, R. (2019). A fast neural network learning algorithm with approximate singular value decomposition, International Journal of Applied Mathematics and Computer Science29(3): 581–594, DOI: 10.2478/amcs-2019-0043.10.2478/amcs-2019-0043
Kaur, N., Saini, H.S. and Singh, R. (2009). Design and analysis of secure scheduler for MLS distributed database systems, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 1400–1404.
Kidon, M. and Dobai, R. (2017). Evolutionary design of hash functions for IP address hashing using genetic programming, IEEE Congress on Evolutionary Computation (CEC), Donostia, Spain, pp. 1720–1727.
Kołodziej, J. (2012). Evolutionary Hierarchical Multi-Criteria Metaheuristics for Scheduling in Large-Scale Grid Systems, Springer, Berlin.10.1007/978-3-642-28971-2
Yee, L.P. and De Silva, L.C. (2002). Application of multilayer perceptron network as a one-way hash function, International Joint Conference on Neural Networks. IJCNN’02, Honolulu, USA, Vol. 2, pp. 1459–1462.
Mahjoob, M.J., Abdollahzade, M., Zarringhalam, R. and Kalhor, A. (2008). Chaotic time series forecasting using locally quadratic fuzzy neural models, 9th WSEAS International Conference on Fuzzy Systems, Sofia, Bulgaria, pp. 26–32.
Mohan, S., Yoon, M.K., Pellizzoni, R. and Bobba, R. (2014). Real-time systems security through scheduler constraints, 26th Euromicro Conference on Real-Time Systems, Madrid, Spain, pp. 129–140.
NIST (2019). Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process, NISTIR 8268, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8268.pdf.
Podolskiy, V., Jindal, A. and Gerndt, M. (2019). Multilayered autoscaling performance evaluation: Can virtual machines and containers co-scale?, International Journal of Applied Mathematics and Computer Science29(2): 227–244, DOI: 10.2478/amcs-2019-0017.10.2478/amcs-2019-0017
Rajeshwaran, K. and Anil Kumar, K. (2019). Cellular automata based hashing algorithm (CABHA) for strong cryptographic hash function, 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, pp. 1–6.
Saleh, M. and Dong, L. (2013). Real-time scheduling with security enhancement for packet switched networks, IEEE Transactions on Network and Service Management10(3): 271–285.10.1109/TNSM.2013.071813.120299
Singh, M. and Garg, D. (2009). Choosing best hashing-strategies and hash functions, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 50–55.
Tadokoro, H., Kourai, K. and Chiba, S. (2010). A secure system-wide process scheduler across virtual machines, 2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing, Tokyo, Japan, pp. 27–36.
Tchórzewski, J. and Jakóbik, A. (2019). Theoretical and experimental analysis of cryptographic hash functions, Journal of Telecommunications and Information Technology1: 125–133.10.26636/jtit.2019.128018
Tchórzewski, J., Jakóbik, A. and Grzonka, D. (2019). Towards ANN-based scalable hashing algorithm for secure task processing in computational clouds, 33rd International ECMS Conference on Modelling and Simulation, Caserta, Italy, pp. 421–427.
Turcanik, M. (2017a). Hash function generation based on neural networks and chaotic maps, Communication and Information Technologies (KIT), Vysoke Tatry, Slovakia, pp. 1–5.10.23919/KIT.2017.8109467
Turcanik, M. (2017b). Using recurrent neural network for hash function generation, International Conference on Applied Electronics (AE), Pilsen, Chech Republic, pp. 1–4.10.23919/AE.2017.8053625
Wang, M. and Li, Y. (2015). Hash function with variable output length, International Conference on Network and Information Systems for Computers, Wuhan, China, pp. 190–193.
Yang, Q., Gao, T., Fan, L. and Gu, Q. (2009). Analysis of one-way alterable length hash function based on cell neural network, 5th International Conference on Information Assurance and Security, Xi’an, China, Vol. 1, pp. 391–395.