1. Guaña-Moya, J., Chiluisa-Chiluisa, M.A., del Carmen Jaramillo-Flores, P., Naranjo-Villota, D., Mora-Zambrano, E.R., Larrea-Torres, L.G.: Ataques de phishing y cómo prevenirlos Phishing attacks and how to prevent them. In 2022 17th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1–6. IEEE (2022)
2. Azevedo, E., Faveri, J.G., Nunes, S.E.: Esteganografia. Rev. de Ciências Exatas e Tecnologia, 10(10), Article 10 (2015). https://doi.org/10.17921/1890-1793.2015v10n10p%p
3. Warner, M.: Wanted: a definition of ‘intelligence’. In: Secret Intelligence, pp. 4–12. Routledge (2019)
4. Carvalho, D.: Esteganografia Digital para transmissão oculta de mensagens. 1(1) (2017). https://silo.tips/queue/esteganografia-digital-para-transmissao-oculta-de-mensagens-diego-fiori-de-carva?&queue_id=-1&v=1662746592&u=MTkxLjk5LjE0MS4xNjY=
5. Renner, R., Wolf, R.: Quantum advantage in cryptography. AIAA J. 61(5), 1895–1910 (2023)