共 31 条
[2]
Fraser B., Phys Can. Spec. Issue Non-Linear Dynam, V57, P155
[3]
Fridrich J, 1997, IEEE SYS MAN CYBERN, P1105, DOI 10.1109/ICSMC.1997.638097
[4]
Symmetric ciphers based on two-dimensional chaotic maps
[J].
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS,
1998, 8 (06)
:1259-1284
[5]
HABUTSU T, 1991, LECT NOTES COMPUT SC, V547, P127
[7]
Hussain N., 2020, Comparative Studied Based on Attack Resilient and Efficient Protocol with Intrusion Detection System Based on Deep Neural Network for Vehicular System Security, P217, DOI [10.1201/9781003038467-13, DOI 10.1201/9781003038467-13]
[8]
Hussain N., 2022, Federated learning for IoT applications, P169
[10]
Kotulski Z, 1997, ANN PHYS-LEIPZIG, V6, P381, DOI 10.1002/andp.19975090504