Author:
Aydogan Ahmet Furkan,Varol Cihan,Vanli Aysenur,Varol Hacer
Publisher
Springer Nature Switzerland
Reference18 articles.
1. Fruhlinger, J.: The OPM hack explained: Bad security practices meet China’s Captain America. CSO Online (2018)
2. Hussain, S., et al.: Exposing vulnerabilities of deepfake detection systems with robust attacks. Digit. Threats Res. Pract. (DTRAP) 3(3), 1–23 (2022)
3. Hamilton-Nyu, K.: Artificial Intelligence Fools Fingerprint Security Systems. Futurity (2018)
4. Advances in Intelligent Systems and Computing;N Lata,2021
5. Crane, C.: Block Cipher Vs Stream Cipher: What They Are and How They Work. Hashed Out by the SSL Store, 30 November 2021