-
1
General Construction Method and Proof for a Class of Quadratic Chaotic Mappings
Published 2025-07-01“…The importance of chaotic systems as the main pseudo-random cryptographic generator of encryption algorithms in the field of communication secrecy cannot be overstated, but in practical applications, researchers often choose to build upon traditional chaotic maps, such as the logistic map, for study and application. This approach provides attackers with more opportunities to compromise the encryption scheme. …”
Get full text
Article -
2
Research on the Credulity of Spear-Phishing Attacks for Lithuanian Education Institutions’ Employees
Published 2025-03-01“…Employees in the education system are highly affected by spear-phishing attacks and need less than one minute to provide attacker-requested data. This illustrates that automated e-mail filtering systems are a key element in the fight against these kinds of attacks.…”
Get full text
Article