References
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers." Information & Security: An International Journal 47, no. 1 (2020): 62-76. "
RSA Weaknesses Caused by the Specifics of Random Number Generation." Information & Security: An International Journal 50, no. 2 (2021): 171-179 . "
Application of Time Series Techniques for Random Number Generator Analysis In XXII Int. Conference DCCN . Moscow, Russia, 2019.
Analysis of header usage patterns of HTTP request messages In 16th IEEE Int. Conf. on High Performance Computing and Communications, 11th IEEE Int. Conf. on Embedded Software and Systems., 2014.
HTTP strict transport security., 2012.
Mitigating cross-site scripting attacks with a content security policy." Computer 3, no. 49, (3) (2016): 56-63. "
Guide to Elliptic Curve Cryptography." Springer Professional Computing (2004). "
CompTIA Security+ Certification Guide. 3rd ed. , Third Edition (Exam SY0-601) 3rd Edition, , 2021.
Padding (Cryptography) Paperback., 2010.