SOBER 发表于 2025-3-23 12:48:52

https://doi.org/10.1007/978-3-030-92166-8Chaotic Systems; Control; Cryptosystems; Cybersecurity; Hiding Information; Multimedia Data; Nonlinear Dyn

挑剔小责 发表于 2025-3-23 14:53:07

http://reply.papertrans.cn/25/2419/241895/241895_12.png

integral 发表于 2025-3-23 20:39:05

Suzanne Myers Adler MD,Leonard Wartofskyapter presents a new chaos-based substitution box (S-box) and its application for securing images. The construction of the presented S-box approach is based on a 5-D chaotic system, which the experimental results prove that the suggested S-box approach has high nonlinearity and good cryptographic ch

连系 发表于 2025-3-23 23:32:46

http://reply.papertrans.cn/25/2419/241895/241895_14.png

AGGER 发表于 2025-3-24 03:34:50

Acute Gastrointestinal Bleedingctrochemical systems. In the literature, fractional systems are encountered in the modelling and controlling of such systems, synchronization applications, communication, modelling and controlling of power systems or chemical processes. Many methods such as PID, sliding mode control, backstepping co

圣歌 发表于 2025-3-24 09:12:18

http://reply.papertrans.cn/25/2419/241895/241895_16.png

Bph773 发表于 2025-3-24 13:49:27

https://doi.org/10.1007/978-3-031-48813-9 Most times in literature both systems are known, but synchronization to some unknown master has a potentially large range of applications, for example, EEG based authentication. We aim to test the feasibility of fuzzy control to systematically synchronize a chaotic EEG record. In this chapter, we s

CHOP 发表于 2025-3-24 18:20:44

https://doi.org/10.1007/978-3-031-48813-9d security analyses. First, the scheme is based on the projective synchronization between two hyperchaotic systems applied to image encryption. The encryption process comprises the generation and discretization of chaotic sequences, the transformation of the sequence elements into the image domain,

Texture 发表于 2025-3-24 20:13:39

http://reply.papertrans.cn/25/2419/241895/241895_19.png

轻触 发表于 2025-3-25 02:43:56

http://reply.papertrans.cn/25/2419/241895/241895_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Cybersecurity; A New Approach Using Ahmed A. Abd El-Latif,Christos Volos Book 2022 The Editor(s) (if applicable) and The Author(s), under e