共 35 条
[1]
Al-Juaid N.A., 2018, J Inf Secur Cybercrimes Res (JISCR), V1, P8, DOI [10.26735/16587790.2018.006, DOI 10.26735/16587790.2018.006]
[2]
Combining RSA and audio steganography on personal computers for enhancing security
[J].
SN APPLIED SCIENCES,
2019, 1 (08)
[4]
ALHUSAINY MAF, 2015, EUROPEAN J SCI RES, V130, P101
[5]
Alotaibi M., 2019, Journal of Information Security and Cybercrimes Research, V2, P9, DOI 10.26735/16587790.2019.001
[6]
ALSAIDI A, J FORENSIC RES, V10
[7]
Alsaidi A., 2018, J COMPUTER SCI COMPU, V8, DOI [10.20967/jcscm.2018.03.002, DOI 10.20967/jcscm.2018.03.002]
[8]
[Anonymous], 2018, J Res Eng Appl Sci
[9]
BUCERZAN D, 2016, INT WORKSH SOFT COMP
[10]
Divya V, 2016, PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET)