1. Burnside, R.S.: The electronic communications privacy act of 1986: the challenge of applying ambiguous statutory language to intricate telecommunication technologies. Rutgers Comput. Tech. L.J. 13, 451 (1987)
2. Gomez, A.N., Huang, S., Zhang, I., Li, B.M., Osama, M., Kaiser, L.: Unsupervised cipher cracking using discrete GANs. In: International Conference on Learning Representations (2018)
3. Lecture Notes in Computer Science;W Wu,2011
4. Pradeepthi, K.V., Tiwari, V., Saxena, A.: Machine learning approach for analysing encrypted data. In: 2018 Tenth International Conference on Advanced Computing (ICoAC). IEEE (December 2018)
5. Zhang, W., Zhao, Y., Fan, S.: Cryptosystem identification scheme based on ASCII code statistics. Secur. Commun. Netw. 2020, 1–10 (2020)