[1]
S. J. Hamadi and Emad A. Mohammed, “Chaotic Systems in Cryptography: An Overview of Feature-Based Methods”, AJEST, vol. 4, no. 1, pp. 164–172, Nov. 2024.