Title | Place | Country |
Vulnerability of complex networks | Communications in Nonlinear Science and Numerical Simulation | |
Exploring the possibilities to control the molecular switching properties and dynamics: A field-switchable rotor-stator molecular system | THE JOURNAL OF CHEMICAL PHYSICS | |
Pseudo-Chaotic Lossy Compressors for True Random Number Generation | Pseudo-Chaotic Lossy Compressors for True Random Number Generation | |
Measuring Vulnerability of Complex Networks by Simulating DDoS Attacks | TELFOR 2010 | Serbija |
Organizations analysis with complex network theory | ICT Innovations 2010-Springer (Book), | Macedonia |
Rich-club and page-club coefficients for directed graphs | Physica A | |
Application of modal analysis in assessing attack vulnerability of complex networks | Communications in Nonlinear Science and Numerical Simulation | |
Model for rumor spreading over networks | PHYSICAL REVIEW E | |
Vulnerability of labeled networks | Physica A: Statistical Mechanics and its Applications | |
Network science: A new paradigm shift | IEEE Network | |
Assessing the performance of assembly tools on simulated Roche/454 sequencing data and their sensitivity to GC content | Proceedings of ICT Innovations | |
Building synchronizable and robust networks | Proceedings of 2010 IEEE International Symposium on Circuits and Systems | |
An opinion disseminating model for market penetration in social networks | Proceedings of 2010 IEEE International Symposium on Circuits and Systems | |
Computation methods for gene finding in prokaryotes | Proceedings of ICT Innovations | |
Innovation Spreading on Graphs | Proceedings of ICT Innovations | |
Selective Attack in virus propagation processes | Proceedings of ICT Innovations | |
An agglomerative clustering technique based on a global similarity metric | Proceedings of ICT Innovations | |
Vulnerability Assessment of Complex Networks based on Optimal Flow Measurements under Intentional Node and Edge Attacks | ICT Innovations 2009-Springer (Book) | Macedonia |
Heterogeneous Epidemiologic Influence Spreading Models In Complex Networks | ETAI 2009 Conference | Macedonia |
Non-Poisson processes of Email Virus Propagation | Proceeding of ICT Innovations 2009 | |
Random walks on networks: Cumulative distribution of cover time | Phys. Rev. E | |
Identification of biological neurons using adaptive observers | Cognitive processing | |
Periodic Dynamics in State Dependent Queuing Networks | Chaos, Solitons, and Fractals | |
Edon-R: An Infinite Family of Cryptographic Hash Functions | International Journal of Network Security | |
Influence Spreading in Complex Networks | Telfor2008 | |
Synchronization in Networks of Hindmarsh–Rose Neurons | IEEE Trans. on Circuits and Systems | |
Discrete Lyapunov Exponent and Resistance to Differential Cryptanalysis | IEEE Trans. on Circuits and Systems | |
Synchronization in complex network topologies | Chaos, Fractals, and Solitons | |
Order patterns | Physics Letters A | |
Discrete Chaos: part I | IEEE Transactions on Circuits and Systems | |
Chaotic Block Ciphers: from theory to practical algorithms | IEEE Transactions on Circuits and Systems | |
Nonlinear Dynamics of Iterative Decoding Systems: Analysis and Applications | IEEE Transactions on Information Theory | |
Traffic dynamics in scale-free networks | ComPlexUs | |
Distribution of edge load in scale-free trees | Physical Review E | |
Unbiased Random Sequences from Quasigroup String Transformations | Lecture Notes in Computer Science | |
Statistical properties of chaos in communication networks | Complex Dynamics in Communication Networks | |
Security of Public Key Cryptosystems based on Chebyshev Polynomials, | IEEE Transactions on Circuits and Systems | |
Cryptographically secure substitutions based on the approximation of mixing maps | IEEE Transactions on Circuits and Systems | |
The permutation entropy rate equals the Kolmogorov-Sinai entropy rate for mixing dynamical systems | Physical Review E | |
Nonlinear Phenomena in Turbo Decoding Algorithms”, in “Digital Communication Devices based on Nonlinear Dynamics and Chaos | Springer Series: Institute for Nonlinear Science | |
Finite-space Lyapunov exponents and pseudo-chaos | Phys Rev Letters | |
Chaos and control of transient chaos in turbo-decoding algorithms | International Journal of Bifurcation and Chaos | |
Public-key Encryption with Chaos | CHAOS | |
Design of Flexible-Length S-Random Interleaver for Turbo Codes | IEEE Communications Letters | |
Bifurcations and Chaos in Turbo Decoding Algorithms | Lecture Notes in Control and Information Sciences | |
Chaos and Pseudo-Randomness | Lecture Notes in Control and Information Sciences | |
Unpredictable Pseudo-Random Bits Generated by Chaotic Maps | IEEE Trans. on Circuits and Systems | |
Differential and Linear Probabilities of a Block Encryption Cipher | IEEE Trans. on Circuits and Systems | |
Cryptanalysis of SBLH | Lecture Notes in Computer Science | |
Improving turbo codes by control of transient chaos in turbo-decoding algorithms | Electronics Letters | |
When are synchronization errors small? | Physical Review - E, | |
Performance Evaluation of CPPM Modulation in Multi-path Environments | Chaos, Fractals and Solitons | |
Lyapunov Exponents, Noise-induced Synchronization and Parrondo`s Paradox | Physical Review - E, | |
Analysis of Some Recently Proposed Chaos-Based Encryption Algorithms | Phys. Letters A | |
Chaos-Based Cryptography: a Brief Overview | IEEE Trans. on Circuits and Systems | |
Periodic Trajectories in Piecewise-Linear Maps | IEEE Trans. on Circuits and Systems | |
Chaos Based Random Number Generators PART II: Practical Realization | IEEE Trans. on Circuits and Systems | |
Chaos Based Random Number Generators PART I: Analysis | IEEE Trans. on Circuits and Systems | |
Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps | IEEE Trans. on Circuits and Systems | |
Digital coding via chaotic systems | IEEE Trans. on Circuits and Systems | |
Applications of symbolic dynamics in chaos synchronization | IEEE Trans. on Circuits and Systems | |
Complex behavior in digital filters with overflow nonlinearity: analytical results | IEEE Trans. on Circuits and Systems | |
Linear conjugacy of vector fields in Lur`e form | IEEE Trans. on Circuits and Systems | |
On Turing instability in two diffusely coupled systems | IEEE Trans. on Circuits and Systems | |
On chaos in digital filters: Case b = -1 | IEEE Trans. on Circuits and Systems | |
Vulnerability of networks of interacting Markov chains | Philosophical Transactions A of the Royal Society | |
Topology Impact on Influence Spreading | International Joint Conferences on Computer, Information, and System Sciences, and Engineering | USA |
Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks | Novel Algorithms and Techniques in Telecommunications and Networking, Book chapter, Springer | |
Using Game Theory to Analyze Distributed Computing Systems | XVI Telekomunikacioni forum TELFOR | Serbija |
A Game Theoretic Approach for User Participation in Grid Projects | International Symposium on Nonlinear Theory and its Applications | Hungary |