標題: Titlebook: Cybersecurity; A New Approach Using Ahmed A. Abd El-Latif,Christos Volos Book 2022 The Editor(s) (if applicable) and The Author(s), under e [打印本頁] 作者: 生長變吼叫 時間: 2025-3-21 17:21
書目名稱Cybersecurity影響因子(影響力)
書目名稱Cybersecurity影響因子(影響力)學(xué)科排名
書目名稱Cybersecurity網(wǎng)絡(luò)公開度
書目名稱Cybersecurity網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cybersecurity被引頻次
書目名稱Cybersecurity被引頻次學(xué)科排名
書目名稱Cybersecurity年度引用
書目名稱Cybersecurity年度引用學(xué)科排名
書目名稱Cybersecurity讀者反饋
書目名稱Cybersecurity讀者反饋學(xué)科排名
作者: 按等級 時間: 2025-3-21 21:04
An Image Compression-Encryption Algorithm Based on Compressed Sensing and Chaotic Oscillator,scillator are applied in a compression-encryption algorithm. Here, we propose an image compression-encryption method using compressed sensing and a chaotic oscillator. At first, the original image is represented in the wavelet domain to obtain sparse coefficients. The sparse representation is scramb作者: 食品室 時間: 2025-3-22 02:57 作者: 向前變橢圓 時間: 2025-3-22 06:50 作者: 根除 時間: 2025-3-22 12:10 作者: Texture 時間: 2025-3-22 15:59
,Secure Communication Scheme Based on?Projective Synchronization of?Hyperchaotic Systems,d security analyses. First, the scheme is based on the projective synchronization between two hyperchaotic systems applied to image encryption. The encryption process comprises the generation and discretization of chaotic sequences, the transformation of the sequence elements into the image domain, 作者: Texture 時間: 2025-3-22 20:59
,Chaos-Based Image Encryption Based on?Bit Level Cubic Shuffling,l Computer, pp 1–11, 2020) [.] is constructed and studied. The generalized map showcases regions of constant chaotic behaviour, similar to the original map. Based on the new map, a statistically secure pseudo-random bit generator is designed, which is utilised in the encryption process. An image enc作者: 注意力集中 時間: 2025-3-22 21:24 作者: Loathe 時間: 2025-3-23 02:56 作者: 兒童 時間: 2025-3-23 07:07 作者: SOBER 時間: 2025-3-23 12:48
https://doi.org/10.1007/978-3-030-92166-8Chaotic Systems; Control; Cryptosystems; Cybersecurity; Hiding Information; Multimedia Data; Nonlinear Dyn作者: 挑剔小責(zé) 時間: 2025-3-23 14:53 作者: integral 時間: 2025-3-23 20:39
Suzanne Myers Adler MD,Leonard Wartofskyapter presents a new chaos-based substitution box (S-box) and its application for securing images. The construction of the presented S-box approach is based on a 5-D chaotic system, which the experimental results prove that the suggested S-box approach has high nonlinearity and good cryptographic ch作者: 連系 時間: 2025-3-23 23:32 作者: AGGER 時間: 2025-3-24 03:34
Acute Gastrointestinal Bleedingctrochemical systems. In the literature, fractional systems are encountered in the modelling and controlling of such systems, synchronization applications, communication, modelling and controlling of power systems or chemical processes. Many methods such as PID, sliding mode control, backstepping co作者: 圣歌 時間: 2025-3-24 09:12 作者: Bph773 時間: 2025-3-24 13:49
https://doi.org/10.1007/978-3-031-48813-9 Most times in literature both systems are known, but synchronization to some unknown master has a potentially large range of applications, for example, EEG based authentication. We aim to test the feasibility of fuzzy control to systematically synchronize a chaotic EEG record. In this chapter, we s作者: CHOP 時間: 2025-3-24 18:20
https://doi.org/10.1007/978-3-031-48813-9d security analyses. First, the scheme is based on the projective synchronization between two hyperchaotic systems applied to image encryption. The encryption process comprises the generation and discretization of chaotic sequences, the transformation of the sequence elements into the image domain, 作者: Texture 時間: 2025-3-24 20:13 作者: 輕觸 時間: 2025-3-25 02:43 作者: 恭維 時間: 2025-3-25 05:33 作者: 不溶解 時間: 2025-3-25 10:58 作者: Substitution 時間: 2025-3-25 15:20 作者: 幼兒 時間: 2025-3-25 16:58 作者: 機制 時間: 2025-3-25 20:00 作者: 材料等 時間: 2025-3-26 00:57 作者: 吸氣 時間: 2025-3-26 07:07
Backstepping and Sliding Mode Control of a Fractional-Order Chaotic System,g and sliding mode method control laws are obtained and their applications are realised. Consequently, their system responses by means of backstepping and sliding mode control results are discussed and compared with each other. Nevertheless, both controllers successfully are be able to regulate the 作者: fibula 時間: 2025-3-26 11:22
Quantum Oscillations: A Promising Field for Secure Communication,to demonstrate the quantum limit cycle. Next, we discuss the possibility of synchronization in the quantum regime. Finally, we discuss some possible applications of quantum oscillations and synchronization in quantum key distribution and cybersecurity.作者: Ophthalmoscope 時間: 2025-3-26 16:39 作者: MOTIF 時間: 2025-3-26 20:03 作者: ENNUI 時間: 2025-3-27 00:14 作者: Provenance 時間: 2025-3-27 05:05
Adaptive Chaotic Maps in Cryptography Applications,s. Therefore, the synthesis of one-way piecewise functions based on adaptive maps with different symmetry coefficients supposes flexible control of the keyspace size and avoidance of dynamic degradation due to the embedded technique of perturbing the chaotic trajectory.作者: impaction 時間: 2025-3-27 07:33 作者: vibrant 時間: 2025-3-27 11:57 作者: filicide 時間: 2025-3-27 17:04
Sharon G. Gregorcyk MD,Robert V. Rege MDto demonstrate the quantum limit cycle. Next, we discuss the possibility of synchronization in the quantum regime. Finally, we discuss some possible applications of quantum oscillations and synchronization in quantum key distribution and cybersecurity.作者: neoplasm 時間: 2025-3-27 18:41
https://doi.org/10.1007/978-3-031-48813-9ed success and failures alike on the synchronization highlighting the difficulty in achieving this kind of synchronization, but we interpret this as advantageous for purposes of the suggested domain application. With successful synchronizations, we confirm that synchronization is feasible. With unsu作者: Arrhythmia 時間: 2025-3-27 23:27 作者: temperate 時間: 2025-3-28 04:31 作者: sinoatrial-node 時間: 2025-3-28 08:57
Intravenous Thrombolytic Therapys. Therefore, the synthesis of one-way piecewise functions based on adaptive maps with different symmetry coefficients supposes flexible control of the keyspace size and avoidance of dynamic degradation due to the embedded technique of perturbing the chaotic trajectory.作者: Antagonist 時間: 2025-3-28 10:36 作者: 生存環(huán)境 時間: 2025-3-28 16:08 作者: 賞錢 時間: 2025-3-28 18:46
Efficient Secure Medical Image Transmission Based on Brownian System,mage that was changed using the Arnold map sequence and the pixel values are manipulated using the Brownian map. The results obtained with the proposed strategy showed that it has a promising performance.作者: FLOAT 時間: 2025-3-29 00:12
Multistability Analysis and MultiSim Simulation of A 12-Term Double-Scroll Hyperchaos System with Tsystems having hyperchaos properties. Due to the good nonlinear properties of the presented hyperchaos system, we introduce its applications in designing secure substitution boxes (S-boxes) and generating pseudo-random number generators (PRNGs). Analyses of results prove the effectiveness of the presented S-box and PRNG mechanisms.作者: violate 時間: 2025-3-29 05:43
2197-6503 s, and technological advances related to‘new chaotic dynamic.This book presents techniques and security challenges of chaotic systems and their use in cybersecurity. It presents the state-of-the-art and the latest discoveries in the field of chaotic systems and methods and proposes new models, pract作者: evanescent 時間: 2025-3-29 08:05 作者: 六個才偏離 時間: 2025-3-29 12:33
Suzanne Myers Adler MD,Leonard Wartofskyaracteristics. In addition, we utilize the effectiveness of the presented S-box approach in designing a novel image cryptosystem, which the experimental outcomes prove the effectiveness of the presented image cryptosystem.作者: 損壞 時間: 2025-3-29 15:55
https://doi.org/10.1007/978-981-10-0965-5mage that was changed using the Arnold map sequence and the pixel values are manipulated using the Brownian map. The results obtained with the proposed strategy showed that it has a promising performance.作者: 連累 時間: 2025-3-29 20:47
Acute Ischemic Stroke in Childrensystems having hyperchaos properties. Due to the good nonlinear properties of the presented hyperchaos system, we introduce its applications in designing secure substitution boxes (S-boxes) and generating pseudo-random number generators (PRNGs). Analyses of results prove the effectiveness of the presented S-box and PRNG mechanisms.作者: 擺動 時間: 2025-3-30 03:02