Име на трудот |
Место |
Држава |
---|
Vulnerability of complex networks |
Communications in Nonlinear Science and Numerical Simulation |
|
Exploring the possibilities to control the molecular switching properties and dynamics: A field-switchable rotor-stator molecular system |
THE JOURNAL OF CHEMICAL PHYSICS |
|
Pseudo-Chaotic Lossy Compressors for True Random Number Generation |
Pseudo-Chaotic Lossy Compressors for True Random Number Generation |
|
Measuring Vulnerability of Complex Networks by Simulating DDoS Attacks |
TELFOR 2010 |
Serbija |
Organizations analysis with complex network theory |
ICT Innovations 2010-Springer (Book), |
Macedonia |
Rich-club and page-club coefficients for directed graphs |
Physica A |
|
Application of modal analysis in assessing attack vulnerability of complex networks |
Communications in Nonlinear Science and Numerical Simulation |
|
Model for rumor spreading over networks |
PHYSICAL REVIEW E |
|
Vulnerability of labeled networks |
Physica A: Statistical Mechanics and its Applications |
|
Network science: A new paradigm shift |
IEEE Network |
|
Assessing the performance of assembly tools on simulated Roche/454 sequencing data and their sensitivity to GC content |
Proceedings of ICT Innovations |
|
Building synchronizable and robust networks |
Proceedings of 2010 IEEE International Symposium on Circuits and Systems |
|
An opinion disseminating model for market penetration in social networks |
Proceedings of 2010 IEEE International Symposium on Circuits and Systems |
|
Computation methods for gene finding in prokaryotes |
Proceedings of ICT Innovations |
|
Innovation Spreading on Graphs |
Proceedings of ICT Innovations |
|
Selective Attack in virus propagation processes |
Proceedings of ICT Innovations |
|
An agglomerative clustering technique based on a global similarity metric |
Proceedings of ICT Innovations |
|
Vulnerability Assessment of Complex Networks based on Optimal Flow Measurements under Intentional Node and Edge Attacks |
ICT Innovations 2009-Springer (Book) |
Macedonia |
Heterogeneous Epidemiologic Influence Spreading Models In Complex Networks |
ETAI 2009 Conference |
Macedonia |
Non-Poisson processes of Email Virus Propagation |
Proceeding of ICT Innovations 2009 |
|
Random walks on networks: Cumulative distribution of cover time |
Phys. Rev. E |
|
Identification of biological neurons using adaptive observers |
Cognitive processing |
|
Periodic Dynamics in State Dependent Queuing Networks |
Chaos, Solitons, and Fractals |
|
Edon-R: An Infinite Family of Cryptographic Hash Functions |
International Journal of Network Security |
|
Influence Spreading in Complex Networks |
Telfor2008 |
|
Synchronization in Networks of Hindmarsh–Rose Neurons |
IEEE Trans. on Circuits and Systems |
|
Discrete Lyapunov Exponent and Resistance to Differential Cryptanalysis |
IEEE Trans. on Circuits and Systems |
|
Synchronization in complex network topologies |
Chaos, Fractals, and Solitons |
|
Order patterns |
Physics Letters A |
|
Discrete Chaos: part I |
IEEE Transactions on Circuits and Systems |
|
Chaotic Block Ciphers: from theory to practical algorithms |
IEEE Transactions on Circuits and Systems |
|
Nonlinear Dynamics of Iterative Decoding Systems: Analysis and Applications |
IEEE Transactions on Information Theory |
|
Traffic dynamics in scale-free networks |
ComPlexUs |
|
Distribution of edge load in scale-free trees |
Physical Review E |
|
Unbiased Random Sequences from Quasigroup String Transformations |
Lecture Notes in Computer Science |
|
Statistical properties of chaos in communication networks |
Complex Dynamics in Communication Networks |
|
Security of Public Key Cryptosystems based on Chebyshev Polynomials, |
IEEE Transactions on Circuits and Systems |
|
Cryptographically secure substitutions based on the approximation of mixing maps |
IEEE Transactions on Circuits and Systems |
|
The permutation entropy rate equals the Kolmogorov-Sinai entropy rate for mixing dynamical systems |
Physical Review E |
|
Nonlinear Phenomena in Turbo Decoding Algorithms”, in “Digital Communication Devices based on Nonlinear Dynamics and Chaos |
Springer Series: Institute for Nonlinear Science |
|
Finite-space Lyapunov exponents and pseudo-chaos |
Phys Rev Letters |
|
Chaos and control of transient chaos in turbo-decoding algorithms |
International Journal of Bifurcation and Chaos |
|
Public-key Encryption with Chaos |
CHAOS |
|
Design of Flexible-Length S-Random Interleaver for Turbo Codes |
IEEE Communications Letters |
|
Bifurcations and Chaos in Turbo Decoding Algorithms |
Lecture Notes in Control and Information Sciences |
|
Chaos and Pseudo-Randomness |
Lecture Notes in Control and Information Sciences |
|
Unpredictable Pseudo-Random Bits Generated by Chaotic Maps |
IEEE Trans. on Circuits and Systems |
|
Differential and Linear Probabilities of a Block Encryption Cipher |
IEEE Trans. on Circuits and Systems |
|
Cryptanalysis of SBLH |
Lecture Notes in Computer Science |
|
Improving turbo codes by control of transient chaos in turbo-decoding algorithms |
Electronics Letters |
|
When are synchronization errors small? |
Physical Review - E, |
|
Performance Evaluation of CPPM Modulation in Multi-path Environments |
Chaos, Fractals and Solitons |
|
Lyapunov Exponents, Noise-induced Synchronization and Parrondo`s Paradox |
Physical Review - E, |
|
Analysis of Some Recently Proposed Chaos-Based Encryption Algorithms |
Phys. Letters A |
|
Chaos-Based Cryptography: a Brief Overview |
IEEE Trans. on Circuits and Systems |
|
Periodic Trajectories in Piecewise-Linear Maps |
IEEE Trans. on Circuits and Systems |
|
Chaos Based Random Number Generators PART II: Practical Realization |
IEEE Trans. on Circuits and Systems |
|
Chaos Based Random Number Generators PART I: Analysis |
IEEE Trans. on Circuits and Systems |
|
Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps |
IEEE Trans. on Circuits and Systems |
|
Digital coding via chaotic systems |
IEEE Trans. on Circuits and Systems |
|
Applications of symbolic dynamics in chaos synchronization |
IEEE Trans. on Circuits and Systems |
|
Complex behavior in digital filters with overflow nonlinearity: analytical results |
IEEE Trans. on Circuits and Systems |
|
Linear conjugacy of vector fields in Lur`e form |
IEEE Trans. on Circuits and Systems |
|
On Turing instability in two diffusely coupled systems |
IEEE Trans. on Circuits and Systems |
|
On chaos in digital filters: Case b = -1 |
IEEE Trans. on Circuits and Systems |
|
Vulnerability of networks of interacting Markov chains |
Philosophical Transactions A of the Royal Society |
|
Topology Impact on Influence Spreading |
International Joint Conferences on Computer, Information, and System Sciences, and Engineering |
USA |
Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks |
Novel Algorithms and Techniques in Telecommunications and Networking, Book chapter, Springer |
|
Using Game Theory to Analyze Distributed Computing Systems |
XVI Telekomunikacioni forum TELFOR |
Serbija |
A Game Theoretic Approach for User Participation in Grid Projects |
International Symposium on Nonlinear Theory and its Applications |
Hungary |