Oversampled Chaotic Binary Sequences with Good Security.
Hongtao ZhangHuiyun WangWai-Kai ChenPublished in: J. Circuits Syst. Comput. (2002)
Keyphrases
- information security
- hidden markov models
- security policies
- security requirements
- intrusion detection
- security issues
- security problems
- information assurance
- binary strings
- security management
- network security
- anomaly detection
- cellular automata
- statistical databases
- non binary
- key management
- phase space
- chaotic neural network
- hamming distance
- security systems
- computer security
- functional requirements
- genetic algorithm
- computer networks
- smart card
- sequential patterns
- access control
- information systems