<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author><author><style face="normal" font="default" size="100%">Ilian Iliev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Randomness in Shared Web Hostings</style></title><secondary-title><style face="normal" font="default" size="100%">BGSIAM’21. 16th Annual Meeting of the Bulgarian Section of SIAM</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 21–23</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author><author><style face="normal" font="default" size="100%">Iliyan Iliev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">RSA Weaknesses Caused by the Specifics of Random Number Generation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">random numbers gen-eration</style></keyword><keyword><style  face="normal" font="default" size="100%">RSA algorithm</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">171-179 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;The rapid entry in digital transformation and Covid-19 moved many activities to the Internet. The application of cybersecurity tools gives a sense of good security condition of the used digital services. This is often how things look on the surface, but the problems sometimes is hard to notice. The current study presents weaknesses in the still widely used cryptographic algorithm RSA, which allows RSA cryptographic keys to be compromised. It demonstrates the connection with RNG as the root of all the resulting controversies around the issues under consideration.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petar Tomov</style></author><author><style face="normal" font="default" size="100%">Iliyan Zankinski</style></author><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity in Donated Distributed Computing for Evolutionary Algorithms</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Donated distributed computing, also known as volunteer computing, is a form of distributed computing that is organized as a public donation of calculating resources. Donated calculating power can involve thousands of separate CPUs and it can achieve the performance of a supercomputer. In most of the cases donated distributed computing is organized by open source software, which can lead to the involvement of many more volunteers. This research focuses on cybersecurity issues when donated distributed computing is used for optimization with evolutionary algorithms.&lt;/p&gt;&lt;p&gt;This paper is included in the program of the Second Scientific Conference &amp;quot;Digital Transformation, Cyber Security and Resilience &lt;a href=&quot;https://digilience.org/content/digilience-2020-program&quot;&gt;DIGILIENCE 2020&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petar Tomov</style></author><author><style face="normal" font="default" size="100%">Iliyan Zankinski</style></author><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Training of artificial neural networks for financial time series forecasting in Android service and widgets</style></title><secondary-title><style face="normal" font="default" size="100%">Problems of Engineering Cybernetics and Robotics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">71</style></volume><pages><style face="normal" font="default" size="100%">50-56</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author><author><style face="normal" font="default" size="100%">Iliyan Zankinski</style></author><author><style face="normal" font="default" size="100%">Bozhidar Shumanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Slot Machines RTP Op-timization with Generic Algorithms</style></title><secondary-title><style face="normal" font="default" size="100%">Numerical Methods and Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Switzerland</style></pub-location><volume><style face="normal" font="default" size="100%">9374</style></volume><pages><style face="normal" font="default" size="100%">210 - 217</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gergana Mateeva</style></author><author><style face="normal" font="default" size="100%">Dimitar Parvanov</style></author><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Differential Evolution and Particle Swarm Optimization  Efficiency According to Pseudo-Random  Number Generator Quality</style></title><secondary-title><style face="normal" font="default" size="100%">Problems of Engineering Cybernetics and Robotics</style></secondary-title></titles><volume><style face="normal" font="default" size="100%">76</style></volume><pages><style face="normal" font="default" size="100%">39-46</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>