<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Tatiana Atanasova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">RNG Entropy Enrichment to Improve Cybersecurity in IoT and Cloud Services</style></title><secondary-title><style face="normal" font="default" size="100%">2022 International Conference on Communications, Information, Electronic and Energy Systems (CIEES)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">24-26 November</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Veliko Tarnovo, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tatiana Atanasova</style></author><author><style face="normal" font="default" size="100%">M. Barova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Exploratory analysis of Time Series for hypothesizes feature values</style></title><secondary-title><style face="normal" font="default" size="100%">International Scientific Conference UniTech 2017</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><publisher><style face="normal" font="default" size="100%">University publishing house V. Aprilov</style></publisher><pub-location><style face="normal" font="default" size="100%">Gabrovo</style></pub-location><volume><style face="normal" font="default" size="100%">ІІ</style></volume><pages><style face="normal" font="default" size="100%">399-403</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valentine Penev</style></author><author><style face="normal" font="default" size="100%">Tatiana Atanasova</style></author><author><style face="normal" font="default" size="100%">Ivanka Valova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Distributed Simulation and Modeling Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal </style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">distributed simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">HAL</style></keyword><keyword><style  face="normal" font="default" size="100%">virtual reality</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1999</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1999</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">161-169</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper a distributed environment which shares the computational resources is proposed. Distributed Simulation system uses models, visual representation and calculation of object movements. The network distribution allows remote access to heterogeneous data sources and functionally divided operation of the system. The status of the environment and its parts are updated and sent over the network so that all participants are fully aware of the environmental situation. Different optimization algorithms are used for tasks of simulation, computation, and visualization.</style></abstract></record></records></xml>