Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Nachev A, Hogan M, Stoyanov B. Cascade-correlation neural networks for breast cancer diagnosis. InProceedings on the International Conference on Artificial Intelligence (ICAI) 2011 (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Öèòèðà ñå â:
Shehab T, Blampied N, Nasr E, Sindhu L. ANN-based estimation model for the preconstruction cost of pavement rehabilitation projects. International Journal of Construction Management. 2024 Jun 10;24(8):894-901. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Petrov E, Stoyanov B, Kochev N, Bangov I. Use of cti index for perception of duplicated chemical structures in large chemical databases. MATCH Commun Math Comput Chem. 2014 Jan 1;71:645-56.
Öèòèðà ñå â:
Shahryari M, Vakili-Nezhaad G. On topological charge indices of graphs. Transactions on Combinatorics. 2024 Dec 1;13(4):351-61. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Äðóãè
| Öèòèðàíèÿ
| Stoyanov B, Kordov K. Novel image encryption scheme based on chebyshev polynomial and duffing map. The Scientific World Journal. 2014;2014(1):283639.
Öèòèðà ñå â:
Lucas Giovani Nardo, Exploiting the chaotic dynamics: novel approaches for cryptosystems, digital systems, and Lyapunov exponent estimation, Theses, repositorio.ufmg.br/handle/1843/75848 |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21.
Öèòèðà ñå â:
H. Saeed, W. I. El sobky, T. O. Diab and M. A. Elsisi, Chaotic Maps in Cryptography, 2024 International Telecommunications Conference (ITC-Egypt), Cairo, Egypt, 2024, pp. 635-645, doi: 10.1109/ITC-Egypt61547.2024.10620474. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21.
Öèòèðà ñå â:
Sarkar A. Recurrent neural networks-guided vector-valued synchronized key exchange for secure and privacy-preserving communication in Industrial Internet of Things. Applied Soft Computing. 2024 Aug 1;161:111731. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21.
Öèòèðà ñå â:
Sarkar, A., Singh, M.M. & Sharma, H.S. Artificial recurrent neural network coordinated secured transmission towards safeguarding confidentiality in smart Industrial Internet of Things. Int. J. Mach. Learn. & Cyber. (2024). https://doi.org/10.1007/s13042-024-02310-4 |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21.
Öèòèðà ñå â:
M. Nazish and M. T. Banday, A Novel Fibonacci-Sequence-Based Chaotification Model for Enhancing Chaos in One-Dimensional Maps, in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2024.3450547 |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21.
Öèòèðà ñå â:
Hai T, Sarkar A, Aksoy M, Khan MZ, Alahmadi A. Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the Industrial Internet of Things. Engineering Applications of Artificial Intelligence. 2024 Feb 1;128:107561. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Ivanova, T., Stoyanov, B., & Dobrev, D. (2023, November). Secure text encryption based on clifford attractors. In 2023 31st National conference with international participation (TELECOM) (pp. 1-4). IEEE.
Öèòèðà ñå â:
Sharma, P. L., Gupta, S., Monga, H., Nayyar, A., Gupta, K., & Sharma, A. K. (2024). TEXCEL: text encryption with elliptic curve cryptography for enhanced security. Multimedia Tools and Applications, 1-29. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21.
Öèòèðà ñå â:
Naik, R.B. and Singh, U., 2024. A review on applications of chaotic maps in pseudo-random number generators and encryption. Annals of Data Science, 11(1), pp.25-50. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 íàó÷íî ñïèñàíèå
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
MD Eqbal Ahmad Shirazi, A Preliminary Review on Image Encryption Techniques, International Journal of Research in Engineering and Management 7 (2) (2024) 42-48 |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
B. D. C. Das, A. Saha and S. S. Sanyal, 3D Lorenz chaotic map to 4D hyperchaos: A comparison based on image encryption, 2024 International Conference on Emerging Systems and Intelligent Computing (ESIC), Bhubaneswar, India, 2024, pp. 51-55, doi: 10.1109/ESIC60604.2024.10481547. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
B. D. C. Das, A. Saha and S. S. Sanyal, Secured Transmission of Biomedical Images Using CHAOS and 2-D Fractional Fourier Transform Based Encryption Scheme, 2024 International Conference on Emerging Systems and Intelligent Computing (ESIC), Bhubaneswar, India, 2024, pp. 46-50, doi: 10.1109/ESIC60604.2024.10481620. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
Das, B.D., Patra, A., Saha, A. et al. Secured communication of multiple compressed infrared images using 6D hyper-chaotic encryption. J Opt (2024). https://doi.org/10.1007/s12596-024-01655-x |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
Chen, Q., Lv, X. Designing a novel image encryption algorithm based on a 2D-SCLC hyperchaotic map. Multimed Tools Appl 83, 77137–77163 (2024). https://doi.org/10.1007/s11042-023-17755-y |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
Prasina Alexander et al 2024 Phys. Scr. 99 085243 |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
Oladipupo, E.T., Abikoye, O.C. and Awotunde, J.B., 2024. A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things. Applied Sciences, 14(7), p.2808. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
Tariq, O., Dastagir, M. B. A., & Han, D. (2024). Compact Walsh-Hadamard Transform-Driven S-Box Design for ASIC Implementations. Electronics, 13(16), 3148. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
Kolivand, H., Hamood, S. F., Asadianfam, S., Mohd Rahim, M. S., & Hurst, W. (2024). Image encryption framework based on multi-chaotic maps and equal pixel values quantization. Multimedia Tools and Applications, 1-36. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
Das, B., Saha, A., & Sikder, S. (2024). A Novel Image Compression Technique and Secured Transmission of Compressed Satellite Images Via Optical Fiber Using 6D Hyper Chaos. Journal of the Indian Society of Remote Sensing, 1-20. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
Wang, M., Fu, X., Teng, L., Yan, X., Xia, Z., & Liu, P. (2024). A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion. Chaos, Solitons & Fractals, 183, 114959. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139.
Öèòèðà ñå â:
Kolivand, H., Hamood, S. F., Asadianfam, S., & Rahim, M. S. (2024). Image encryption techniques: A comprehensive review. Multimedia Tools and Applications. |
02.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Kordov, K. M., & Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunication, 63(4), 417-422.
Öèòèðà ñå â:
Alamleh, H., & Estremera, L. (2024, May). Secure Media Timestamping: Challenges, Solutions, and Frameworks. In Mobilkommunikation; 28. ITG-Fachtagung (pp. 31-34). VDE. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Kordov, K. M., & Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunication, 63(4), 417-422.
Öèòèðà ñå â:
Saeed, H., Diab, T. O., & Elsisi, M. A. (2024, July). Chaotic Maps in Cryptography. In 2024 International Telecommunications Conference (ITC-Egypt) (pp. 635-645). IEEE. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Kordov, K. M., & Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunication, 63(4), 417-422.
Öèòèðà ñå â:
Naik, R. B., & Singh, U. (2024). A review on applications of chaotic maps in pseudo-random number generators and encryption. Annals of Data Science, 11(1), 25-50. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Stoyanov, B., & Ivanova, T. (2019, November). CHAOSA: Chaotic map based random number generator on Arduino platform. In AIP Conference Proceedings (Vol. 2172, No. 1). AIP Publishing.
Öèòèðà ñå â:
Laskaridis, L., Volos, C., Giakoumis, A., Nistazakis, H., Antoniades, I. P., & Stouboulos, I. (2024, March). A Microcontroller Implementation of a Pseudo-random Bit Generator based on a 2D Discrete Memristive Hyperchaotic Map. In 2024 Panhellenic Conference on Electronics & Telecommunications (PACET) (pp. 1-4). IEEE. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Ivanova, T. (2019, November). CHAOSA: Chaotic map based random number generator on Arduino platform. In AIP Conference Proceedings (Vol. 2172, No. 1). AIP Publishing.
Öèòèðà ñå â:
Saeed, H., Diab, T. O., & Elsisi, M. A. (2024, July). Chaotic Maps in Cryptography. In 2024 International Telecommunications Conference (ITC-Egypt) (pp. 635-645). IEEE. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Ivanova, T. (2019, November). CHAOSA: Chaotic map based random number generator on Arduino platform. In AIP Conference Proceedings (Vol. 2172, No. 1). AIP Publishing.
Öèòèðà ñå â:
Naik, R. B., & Singh, U. (2024). A review on applications of chaotic maps in pseudo-random number generators and encryption. Annals of Data Science, 11(1), 25-50. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Nedzhibov, G. (2020). Symmetric key encryption based on rotation-translation equation. Symmetry, 12(1), 73.
Öèòèðà ñå â:
Hasija, T., Ramkumar, K. R., Singh, B., Kaur, A., & Mittal, S. K. (2024). Applying Polynomials for Developing Post Quantum Cryptography Algorithms to Secure Online Information-An Initial Hypothesis. Recent Advances in Computer Science and Communications. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Nedzhibov, G. (2020). Symmetric key encryption based on rotation-translation equation. Symmetry, 12(1), 73.
Öèòèðà ñå â:
Das, R., Khan, A., Arya, R. et al. SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication. Int J Syst Assur Eng Manag 15, 2391-2400 (2024). https://doi.org/10.1007/s13198-024-02253-7 |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Nedzhibov, G. (2020). Symmetric key encryption based on rotation-translation equation. Symmetry, 12(1), 73.
Öèòèðà ñå â:
Amina, Y., Bekkouche, T., Daachi, M. E. H., & Diffellah, N. (2024). A novel trigonometric 3D chaotic map and its application in a double permutation-diffusion image encryption. Multimedia Tools and Applications, 83(3), 7895-7918. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Stoyanov, B. (2020). Self-Shrinking Chaos Based Pseudo-Random Algorithm. Annals of the Academy of Romanian Scientists: Series on Mathematics and its Applications, 12(1-2), 246-255.
Öèòèðà ñå â:
Liu, B. (2024). Application and Research of Chaos Algorithm in Information Security Systems. In 2023 IEEE 15th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 375-380). IEEE. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Paraskevov, H., Stefanov, A., & Stoyanov, B. (2020). Yash: Yet another stego hiding. Annals of the Academy of Romanian Scientists: Series on Mathematics and its Applications, 12, 238-245.
Öèòèðà ñå â:
Rafailov, R. (2024, November). Parallel steganographic algorithm based on least significant bit. In E3S Web of Conferences (Vol. 508, p. 04018). EDP Sciences. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Stoyanov, B. (2020). BOOST: medical image steganography using nuclear spin generator. Entropy, 22(5), 501.
Öèòèðà ñå â:
Pramanik, S. (2024). A new method for locating data hiding in image steganography. Multimedia Tools and Applications, 83(12), 34323-34349. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Stoyanov, B. (2020). BOOST: medical image steganography using nuclear spin generator. Entropy, 22(5), 501.
Öèòèðà ñå â:
Saidi, H., Tibermacine, O., & Elhadad, A. (2024). High-capacity data hiding for medical images based on the mask-RCNN model. Scientific Reports, 14(1), 7166. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Stoyanov, B. (2020). BOOST: medical image steganography using nuclear spin generator. Entropy, 22(5), 501.
Öèòèðà ñå â:
Peng, Y., Fu, C., Zheng, Y., Tian, Y., Cao, G., & Chen, J. (2024). Medical steganography: Enhanced security and image quality, and new SQ assessment. Signal Processing, 223, 109546. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Paraskevov, H., & Stoyanov, B. (2020). Steganographic algorithm based on chaotic random system on raspberry pi hardware. Proceedings of the Applications of Mathematics in Engineering and Economics (amee20), Sofia, Bulgaria, 7-13.
Öèòèðà ñå â:
Rafailov R. Parallel steganographic algorithm based on least significant bit. InE3S Web of Conferences 2024 Nov (Vol. 508, p. 04018). EDP Sciences. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 íàó÷íî ñïèñàíèå
| Öèòèðàíèÿ
| Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190.
Öèòèðà ñå â:
Babaleshwar, V. K., Karade, S., Sakshi, N., and Naidu, A. (2024). Audio Encryption and Decryption using AES Algorithm Technique. i-manager’s Journal on Electronics Engineering, 14(2), 8-12. https://doi.org/10.26634/jele.14.2.20486. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Öèòèðàíèÿ
| Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190.
Öèòèðà ñå â:
Demirtas, Mehmet. \"A Sound Encryption Method Based on Feature Extraction and a Novel Chaotic Map.\" In Proceedings of the 2024 10th International Conference on Computer Technology Applications, pp. 303-309. 2024. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190.
Öèòèðà ñå â:
Helmy M. Audio Transmission Based on Hybrid Crypto-steganography Framework for Efficient Cyber Security in Wireless Communication System. Multimedia Tools and Applications. 2024 Jul 12:1-25. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190.
Öèòèðà ñå â:
Joshi, A. B., & Gaffar, A. (2024). A technique for securing digital audio files based on rotation and XOR operations. Soft Computing, 28(6), 5523-5540. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190.
Öèòèðà ñå â:
Fotso, S. B. N., Atchoffo, W. N., Nzeukou, A. C., & Talla Mbe, J. H. (2024). Enhanced security in lossless audio encryption using zigzag scrambling, DNA coding, SHA-256, and hopfield networks: a practical vlc system implementation. Multimedia Tools and Applications, 1-35. |
01.11.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Öèòèðàíèÿ
| Todorova, M., Stoyanov, B., Szczypiorski, K., Kordov, K. (2018). SHAH: Hash Function based on Irregularly Decimated Chaotic Map. International Journal of Electronics and Telecommunications, 64(4), 457-465.
Öèòèðà ñå â:
Li, Y., & Ge, G. (2019). Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimedia Tools and Applications, Volume 78, Issue 13, pp 17973–17994. |
31.10.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Stoyanov, B.; Nedzhibov, G.; Dobrev, D.; Ivanova, T. Application of Decimated Mathematical Equations and Polynomial Root-Finding Method in Protection of Text Messages. Mathematics 2023, 11, 4982. https://doi.org/10.3390/math11244982. |
30.10.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| STOYANOV, B., & BANGOV, I. (2023). USE OF DESCRIPTOR FINGERPRINTS IN BIO-DIESEL DISCRIMINATION. THE MEAN DIFFERENCE APPROACH. Oxidation Communications, 46(3), 580 - 586. |
30.10.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| T. Ivanova, B. Stoyanov and D. Dobrev, \"Secure Text Encryption Based on Clifford Attractors,\" 2023 31st National Conference with International Participation (TELECOM), Sofia, Bulgaria, 2023, pp. 1-4, doi: 10.1109/TELECOM59629.2023.10409685. |
30.10.2024 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| B. Stoyanov, D. Dobrev, Parallel Data Encryption Based on Tinkerbell and Ikeda Chaotic Functions, CEUR Workshop Proceedings, 2022, 3191, pp. 36–44, SJR 2021 = 0.228, Scopus,
http://ceur-ws.org/Vol-3191/paper03.pdf
|
24.08.2022 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Stoyanov, B. P., Dimitrov, I. E., Doytchinova, I. A., Bangov, I. P. (2021). Clustering of Red/White Wine and Allergen/Non-Allergen Data Sets by Using Descriptor Fingerprints. In IOP Conference Series: Materials Science and Engineering (Vol. 1031, No. 1, p. 012053). IOP Publishing. https://doi.org/10.1088/1757-899X/1031/1/012053, Scopus SJR = 0.249. |
06.07.2022 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
Ñ èìïàêò ôàêòîð
| Ñòàòèè
| Stoyanov, B., Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190. https://doi.org/10.3390/app112110190, WoS IF 2021 = 2.838, Scopus SJR = 0.507. |
06.07.2022 |
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
|
 ðåôåðèðàíè èçäàíèÿ
| Ñòàòèè
| Todorova, M., Stoyanov, B. (2021, March). Novel hash function using Zaslavsky map. In AIP Conference Proceedings (Vol. 2333, No. 1, p. 070005). AIP Publishing LLC. https://doi.org/10.1063/5.0041864, Scopus SJR 2021 = 0.189. |
06.07.2022 |