print
Òúðñè Îáùà ñòàòèñòèêà Ïðåïîäàâàòåëè
string(3) "177"
ÔÌÈ / ÊÎÌÏÞÒÚÐÍÀ ÈÍÔÎÐÌÀÒÈÊÀ / Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ
Ñòðàíèöà: 1/8,îáùî çàïèñè:351
íàïðåä
Àâòîð Òèï Êàòåãîðèÿ Ïóáëèêàöèÿ Ðåäàêöèÿ
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Nachev A, Hogan M, Stoyanov B. Cascade-correlation neural networks for breast cancer diagnosis. InProceedings on the International Conference on Artificial Intelligence (ICAI) 2011 (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). Öèòèðà ñå â: Shehab T, Blampied N, Nasr E, Sindhu L. ANN-based estimation model for the preconstruction cost of pavement rehabilitation projects. International Journal of Construction Management. 2024 Jun 10;24(8):894-901. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Petrov E, Stoyanov B, Kochev N, Bangov I. Use of cti index for perception of duplicated chemical structures in large chemical databases. MATCH Commun Math Comput Chem. 2014 Jan 1;71:645-56. Öèòèðà ñå â: Shahryari M, Vakili-Nezhaad G. On topological charge indices of graphs. Transactions on Combinatorics. 2024 Dec 1;13(4):351-61. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Äðóãè Öèòèðàíèÿ Stoyanov B, Kordov K. Novel image encryption scheme based on chebyshev polynomial and duffing map. The Scientific World Journal. 2014;2014(1):283639. Öèòèðà ñå â: Lucas Giovani Nardo, Exploiting the chaotic dynamics: novel approaches for cryptosystems, digital systems, and Lyapunov exponent estimation, Theses, repositorio.ufmg.br/handle/1843/75848 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21. Öèòèðà ñå â: H. Saeed, W. I. El sobky, T. O. Diab and M. A. Elsisi, Chaotic Maps in Cryptography, 2024 International Telecommunications Conference (ITC-Egypt), Cairo, Egypt, 2024, pp. 635-645, doi: 10.1109/ITC-Egypt61547.2024.10620474. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21. Öèòèðà ñå â: Sarkar A. Recurrent neural networks-guided vector-valued synchronized key exchange for secure and privacy-preserving communication in Industrial Internet of Things. Applied Soft Computing. 2024 Aug 1;161:111731. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21. Öèòèðà ñå â: Sarkar, A., Singh, M.M. & Sharma, H.S. Artificial recurrent neural network coordinated secured transmission towards safeguarding confidentiality in smart Industrial Internet of Things. Int. J. Mach. Learn. & Cyber. (2024). https://doi.org/10.1007/s13042-024-02310-4 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21. Öèòèðà ñå â: M. Nazish and M. T. Banday, A Novel Fibonacci-Sequence-Based Chaotification Model for Enhancing Chaos in One-Dimensional Maps, in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2024.3450547 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21. Öèòèðà ñå â: Hai T, Sarkar A, Aksoy M, Khan MZ, Alahmadi A. Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the Industrial Internet of Things. Engineering Applications of Artificial Intelligence. 2024 Feb 1;128:107561. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Ivanova, T., Stoyanov, B., & Dobrev, D. (2023, November). Secure text encryption based on clifford attractors. In 2023 31st National conference with international participation (TELECOM) (pp. 1-4). IEEE. Öèòèðà ñå â: Sharma, P. L., Gupta, S., Monga, H., Nayyar, A., Gupta, K., & Sharma, A. K. (2024). TEXCEL: text encryption with elliptic curve cryptography for enhanced security. Multimedia Tools and Applications, 1-29. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov B, Kordov K. Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics. 2015;9(9):411-21. Öèòèðà ñå â: Naik, R.B. and Singh, U., 2024. A review on applications of chaotic maps in pseudo-random number generators and encryption. Annals of Data Science, 11(1), pp.25-50. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ  íàó÷íî ñïèñàíèå Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: MD Eqbal Ahmad Shirazi, A Preliminary Review on Image Encryption Techniques, International Journal of Research in Engineering and Management 7 (2) (2024) 42-48 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: B. D. C. Das, A. Saha and S. S. Sanyal, 3D Lorenz chaotic map to 4D hyperchaos: A comparison based on image encryption, 2024 International Conference on Emerging Systems and Intelligent Computing (ESIC), Bhubaneswar, India, 2024, pp. 51-55, doi: 10.1109/ESIC60604.2024.10481547. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: B. D. C. Das, A. Saha and S. S. Sanyal, Secured Transmission of Biomedical Images Using CHAOS and 2-D Fractional Fourier Transform Based Encryption Scheme, 2024 International Conference on Emerging Systems and Intelligent Computing (ESIC), Bhubaneswar, India, 2024, pp. 46-50, doi: 10.1109/ESIC60604.2024.10481620. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: Das, B.D., Patra, A., Saha, A. et al. Secured communication of multiple compressed infrared images using 6D hyper-chaotic encryption. J Opt (2024). https://doi.org/10.1007/s12596-024-01655-x 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: Chen, Q., Lv, X. Designing a novel image encryption algorithm based on a 2D-SCLC hyperchaotic map. Multimed Tools Appl 83, 77137–77163 (2024). https://doi.org/10.1007/s11042-023-17755-y 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: Prasina Alexander et al 2024 Phys. Scr. 99 085243 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: Oladipupo, E.T., Abikoye, O.C. and Awotunde, J.B., 2024. A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things. Applied Sciences, 14(7), p.2808. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: Tariq, O., Dastagir, M. B. A., & Han, D. (2024). Compact Walsh-Hadamard Transform-Driven S-Box Design for ASIC Implementations. Electronics, 13(16), 3148. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: Kolivand, H., Hamood, S. F., Asadianfam, S., Mohd Rahim, M. S., & Hurst, W. (2024). Image encryption framework based on multi-chaotic maps and equal pixel values quantization. Multimedia Tools and Applications, 1-36. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: Das, B., Saha, A., & Sikder, S. (2024). A Novel Image Compression Technique and Secured Transmission of Compressed Satellite Images Via Optical Fiber Using 6D Hyper Chaos. Journal of the Indian Society of Remote Sensing, 1-20. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: Wang, M., Fu, X., Teng, L., Yan, X., Xia, Z., & Liu, P. (2024). A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion. Chaos, Solitons & Fractals, 183, 114959. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Kordov, K. (2015). Image encryption using Chebyshev map and rotation equation. Entropy, 17(4), 2117-2139. Öèòèðà ñå â: Kolivand, H., Hamood, S. F., Asadianfam, S., & Rahim, M. S. (2024). Image encryption techniques: A comprehensive review. Multimedia Tools and Applications. 02.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Kordov, K. M., & Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunication, 63(4), 417-422. Öèòèðà ñå â: Alamleh, H., & Estremera, L. (2024, May). Secure Media Timestamping: Challenges, Solutions, and Frameworks. In Mobilkommunikation; 28. ITG-Fachtagung (pp. 31-34). VDE. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Kordov, K. M., & Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunication, 63(4), 417-422. Öèòèðà ñå â: Saeed, H., Diab, T. O., & Elsisi, M. A. (2024, July). Chaotic Maps in Cryptography. In 2024 International Telecommunications Conference (ITC-Egypt) (pp. 635-645). IEEE. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Kordov, K. M., & Stoyanov, B. (2017). Least Significant Bit Steganography using Hitzl-Zele Chaotic Map. International Journal of Electronics and Telecommunication, 63(4), 417-422. Öèòèðà ñå â: Naik, R. B., & Singh, U. (2024). A review on applications of chaotic maps in pseudo-random number generators and encryption. Annals of Data Science, 11(1), 25-50. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Stoyanov, B., & Ivanova, T. (2019, November). CHAOSA: Chaotic map based random number generator on Arduino platform. In AIP Conference Proceedings (Vol. 2172, No. 1). AIP Publishing. Öèòèðà ñå â: Laskaridis, L., Volos, C., Giakoumis, A., Nistazakis, H., Antoniades, I. P., & Stouboulos, I. (2024, March). A Microcontroller Implementation of a Pseudo-random Bit Generator based on a 2D Discrete Memristive Hyperchaotic Map. In 2024 Panhellenic Conference on Electronics & Telecommunications (PACET) (pp. 1-4). IEEE. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Ivanova, T. (2019, November). CHAOSA: Chaotic map based random number generator on Arduino platform. In AIP Conference Proceedings (Vol. 2172, No. 1). AIP Publishing. Öèòèðà ñå â: Saeed, H., Diab, T. O., & Elsisi, M. A. (2024, July). Chaotic Maps in Cryptography. In 2024 International Telecommunications Conference (ITC-Egypt) (pp. 635-645). IEEE. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Ivanova, T. (2019, November). CHAOSA: Chaotic map based random number generator on Arduino platform. In AIP Conference Proceedings (Vol. 2172, No. 1). AIP Publishing. Öèòèðà ñå â: Naik, R. B., & Singh, U. (2024). A review on applications of chaotic maps in pseudo-random number generators and encryption. Annals of Data Science, 11(1), 25-50. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Nedzhibov, G. (2020). Symmetric key encryption based on rotation-translation equation. Symmetry, 12(1), 73. Öèòèðà ñå â: Hasija, T., Ramkumar, K. R., Singh, B., Kaur, A., & Mittal, S. K. (2024). Applying Polynomials for Developing Post Quantum Cryptography Algorithms to Secure Online Information-An Initial Hypothesis. Recent Advances in Computer Science and Communications. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Nedzhibov, G. (2020). Symmetric key encryption based on rotation-translation equation. Symmetry, 12(1), 73. Öèòèðà ñå â: Das, R., Khan, A., Arya, R. et al. SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication. Int J Syst Assur Eng Manag 15, 2391-2400 (2024). https://doi.org/10.1007/s13198-024-02253-7 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Nedzhibov, G. (2020). Symmetric key encryption based on rotation-translation equation. Symmetry, 12(1), 73. Öèòèðà ñå â: Amina, Y., Bekkouche, T., Daachi, M. E. H., & Diffellah, N. (2024). A novel trigonometric 3D chaotic map and its application in a double permutation-diffusion image encryption. Multimedia Tools and Applications, 83(3), 7895-7918. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Stoyanov, B. (2020). Self-Shrinking Chaos Based Pseudo-Random Algorithm. Annals of the Academy of Romanian Scientists: Series on Mathematics and its Applications, 12(1-2), 246-255. Öèòèðà ñå â: Liu, B. (2024). Application and Research of Chaos Algorithm in Information Security Systems. In 2023 IEEE 15th International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 375-380). IEEE. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Paraskevov, H., Stefanov, A., & Stoyanov, B. (2020). Yash: Yet another stego hiding. Annals of the Academy of Romanian Scientists: Series on Mathematics and its Applications, 12, 238-245. Öèòèðà ñå â: Rafailov, R. (2024, November). Parallel steganographic algorithm based on least significant bit. In E3S Web of Conferences (Vol. 508, p. 04018). EDP Sciences. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Stoyanov, B. (2020). BOOST: medical image steganography using nuclear spin generator. Entropy, 22(5), 501. Öèòèðà ñå â: Pramanik, S. (2024). A new method for locating data hiding in image steganography. Multimedia Tools and Applications, 83(12), 34323-34349. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Stoyanov, B. (2020). BOOST: medical image steganography using nuclear spin generator. Entropy, 22(5), 501. Öèòèðà ñå â: Saidi, H., Tibermacine, O., & Elhadad, A. (2024). High-capacity data hiding for medical images based on the mask-RCNN model. Scientific Reports, 14(1), 7166. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Stoyanov, B. (2020). BOOST: medical image steganography using nuclear spin generator. Entropy, 22(5), 501. Öèòèðà ñå â: Peng, Y., Fu, C., Zheng, Y., Tian, Y., Cao, G., & Chen, J. (2024). Medical steganography: Enhanced security and image quality, and new SQ assessment. Signal Processing, 223, 109546. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Paraskevov, H., & Stoyanov, B. (2020). Steganographic algorithm based on chaotic random system on raspberry pi hardware. Proceedings of the Applications of Mathematics in Engineering and Economics (amee20), Sofia, Bulgaria, 7-13. Öèòèðà ñå â: Rafailov R. Parallel steganographic algorithm based on least significant bit. InE3S Web of Conferences 2024 Nov (Vol. 508, p. 04018). EDP Sciences. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ  íàó÷íî ñïèñàíèå Öèòèðàíèÿ Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190. Öèòèðà ñå â: Babaleshwar, V. K., Karade, S., Sakshi, N., and Naidu, A. (2024). Audio Encryption and Decryption using AES Algorithm Technique. i-manager’s Journal on Electronics Engineering, 14(2), 8-12. https://doi.org/10.26634/jele.14.2.20486. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Öèòèðàíèÿ Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190. Öèòèðà ñå â: Demirtas, Mehmet. \"A Sound Encryption Method Based on Feature Extraction and a Novel Chaotic Map.\" In Proceedings of the 2024 10th International Conference on Computer Technology Applications, pp. 303-309. 2024. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190. Öèòèðà ñå â: Helmy M. Audio Transmission Based on Hybrid Crypto-steganography Framework for Efficient Cyber Security in Wireless Communication System. Multimedia Tools and Applications. 2024 Jul 12:1-25. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190. Öèòèðà ñå â: Joshi, A. B., & Gaffar, A. (2024). A technique for securing digital audio files based on rotation and XOR operations. Soft Computing, 28(6), 5523-5540. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Stoyanov, B., & Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190. Öèòèðà ñå â: Fotso, S. B. N., Atchoffo, W. N., Nzeukou, A. C., & Talla Mbe, J. H. (2024). Enhanced security in lossless audio encryption using zigzag scrambling, DNA coding, SHA-256, and hopfield networks: a practical vlc system implementation. Multimedia Tools and Applications, 1-35. 01.11.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Öèòèðàíèÿ Todorova, M., Stoyanov, B., Szczypiorski, K., Kordov, K. (2018). SHAH: Hash Function based on Irregularly Decimated Chaotic Map. International Journal of Electronics and Telecommunications, 64(4), 457-465. Öèòèðà ñå â: Li, Y., & Ge, G. (2019). Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimedia Tools and Applications, Volume 78, Issue 13, pp 17973–17994. 31.10.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Ñòàòèè Stoyanov, B.; Nedzhibov, G.; Dobrev, D.; Ivanova, T. Application of Decimated Mathematical Equations and Polynomial Root-Finding Method in Protection of Text Messages. Mathematics 2023, 11, 4982. https://doi.org/10.3390/math11244982. 30.10.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè STOYANOV, B., & BANGOV, I. (2023). USE OF DESCRIPTOR FINGERPRINTS IN BIO-DIESEL DISCRIMINATION. THE MEAN DIFFERENCE APPROACH. Oxidation Communications, 46(3), 580 - 586. 30.10.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè T. Ivanova, B. Stoyanov and D. Dobrev, \"Secure Text Encryption Based on Clifford Attractors,\" 2023 31st National Conference with International Participation (TELECOM), Sofia, Bulgaria, 2023, pp. 1-4, doi: 10.1109/TELECOM59629.2023.10409685. 30.10.2024
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè B. Stoyanov, D. Dobrev, Parallel Data Encryption Based on Tinkerbell and Ikeda Chaotic Functions, CEUR Workshop Proceedings, 2022, 3191, pp. 36–44, SJR 2021 = 0.228, Scopus, http://ceur-ws.org/Vol-3191/paper03.pdf 24.08.2022
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè Stoyanov, B. P., Dimitrov, I. E., Doytchinova, I. A., Bangov, I. P. (2021). Clustering of Red/White Wine and Allergen/Non-Allergen Data Sets by Using Descriptor Fingerprints. In IOP Conference Series: Materials Science and Engineering (Vol. 1031, No. 1, p. 012053). IOP Publishing. https://doi.org/10.1088/1757-899X/1031/1/012053, Scopus SJR = 0.249. 06.07.2022
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Ñ èìïàêò ôàêòîð Ñòàòèè Stoyanov, B., Ivanova, T. (2021). Novel Implementation of Audio Encryption Using Pseudorandom Byte Generator. Applied Sciences, 11(21), 10190. https://doi.org/10.3390/app112110190, WoS IF 2021 = 2.838, Scopus SJR = 0.507. 06.07.2022
Ïðîô. ä.í. Áîðèñëàâ Ïàíàéîòîâ Ñòîÿíîâ Â ðåôåðèðàíè èçäàíèÿ Ñòàòèè Todorova, M., Stoyanov, B. (2021, March). Novel hash function using Zaslavsky map. In AIP Conference Proceedings (Vol. 2333, No. 1, p. 070005). AIP Publishing LLC. https://doi.org/10.1063/5.0041864, Scopus SJR 2021 = 0.189. 06.07.2022
Ñòðàíèöà2: 1/8,îáùî çàïèñè:351