[HTML][HTML] Development of additive Fibonacci generators with improved characteristics for cybersecurity needs
V Maksymovych, M Shabatura, O Harasymchuk… - Applied Sciences, 2022 - mdpi.com
Pseudorandom sequence generation is used in many industries, including cryptographic
information security devices, measurement technology, and communication systems. The …
information security devices, measurement technology, and communication systems. The …
[HTML][HTML] A new approach to the development of additive Fibonacci generators based on prime numbers
V Maksymovych, O Harasymchuk, M Karpinski… - Electronics, 2021 - mdpi.com
Pseudorandom number and bit sequence generators are widely used in cybersecurity,
measurement, and other technology fields. A special place among such generators is …
measurement, and other technology fields. A special place among such generators is …
A passive isolation of sensor faults from un-stealthy attacks in uncertain nonlinear systems
M Ramadan, F Abdollahi - ISA transactions, 2023 - Elsevier
In this paper, a novel nonlinear observer-based approach is established to cast light on the
problem of isolating sensor faults from un-stealthy attacks for Lipschitz affine nonlinear …
problem of isolating sensor faults from un-stealthy attacks for Lipschitz affine nonlinear …
Using Digital Twin to Detect Cyber-Attacks in Industrial Control Systems
J Pisani, G Cavone, F Pascucci… - IEEE EUROCON 2023 …, 2023 - ieeexplore.ieee.org
The digital transition is largely impacting industrial control systems. The integration of
information and communication technologies in industrial control systems on the one hand …
information and communication technologies in industrial control systems on the one hand …
Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and to Predict Future Community Intrusions
S Prabhu, N PS - International Journal of Applied Engineering and …, 2022 - papers.ssrn.com
Purpose: Because of the apparent rapid advancement in the field of information and
communication technology and its constant connection to the internet, customer and …
communication technology and its constant connection to the internet, customer and …
A Novel Approach of BRELU RESNET Based Cyber Attack Detection System with BAIT Based Approach for Mitigation
S Prabhu, PS Nethravathi - International Journal of Applied …, 2022 - supublication.com
Purpose: Industrial Control Systems become more vulnerable to digital attacks by merging
communication groups and the Internet of Things, which could have severe implications. An …
communication groups and the Internet of Things, which could have severe implications. An …
Покращення статистичних характеристик псевдовипадкових бітових послідовностей модифікованого адитивного генератора Фібоначчі
МВ Кіх, ОА Нємкова - Сучасний захист інформації, 2024 - journals.dut.edu.ua
Анотація Псевдовипадкові бітові послідовності (ПВБП) відіграють ключову роль у
багатьох областях інформаційної безпеки, криптографії та комп'ютерних наук …
багатьох областях інформаційної безпеки, криптографії та комп'ютерних наук …
[PDF][PDF] Research theme title
F Pascucci, G Cavone - dausy.poliba.it
Over the past decade, the paradigm of the Internet of Things has made its way in the
Industrial sector, leading to the broader concept of Industrial Internet of Things (IIoT)[1]. In …
Industrial sector, leading to the broader concept of Industrial Internet of Things (IIoT)[1]. In …