Secure message recovery in presence of the cyber-attack using discrete-time chaotic modulation approach
From MaRDI portal
Publication:6179971
DOI10.1016/j.ins.2023.119923zbMath1530.94042OpenAlexW4388794048MaRDI QIDQ6179971
Marzieh Samimiat, Ali Akbar Ahmadi
Publication date: 18 January 2024
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2023.119923
Cites Work
- Singular reduced-order observer-based synchronization for uncertain chaotic systems subject to channel disturbance and chaos-based secure communication
- Robust synchronization of a class of uncertain chaotic systems
- On the design of chaos-based secure communication systems
- Model-based fault diagnosis techniques. Design schemes, algorithms and tools
- Fuzzy synchronization of chaotic systems via intermittent control
- Synchronization of generalized Henon map by using adaptive fuzzy controller.
- Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control
- Sliding mode observers for fault detection and isolation
- Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
- New reliable nonuniform sampling control for uncertain chaotic neural networks under Markov switching topologies
- Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks
- Artificial switched chaotic system used as transmitter in chaos-based secure communication
- A new approach for constrained chaos synchronization with application to secure data communication
- Control and synchronization for a class of new chaotic systems via linear feedback
- Nonlinear unknown input sliding mode observer based chaotic system synchronization and message recovery scheme with uncertainty
- New adaptive synchronization algorithm for a general class of complex hyperchaotic systems with unknown parameters and its application to secure communication
- Chaos in Nature
This page was built for publication: Secure message recovery in presence of the cyber-attack using discrete-time chaotic modulation approach