1. Rupa, C., Avadhani, P.S.: Message encryption scheme using cheating text. ITNG 2009 – 6th Int. Conf. Inf. Technol. New Gener. 1, 470–474 (2009)
2. Moghaddam, F.F., Karimi, O., Alrashdan, M.T.: A comparative study of applying real-time encryption in cloud computing environments. 2013 IEEE 2nd Int. Conf. Cloud Netw. 1, 185–189 (2013)
3. De Matos, S.C.: A Lingua dos “Filhos errantes da Sociedade”: Discurso, Poder e Discriminação nas gírias do sistema penitenciário do interior do Tocantins, no. 2004, pp. 559–570 (2013)
4. Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., Horgan, J.: Terrorist use of the internet by the numbers: quantifying behaviors, patterns, and processes. Criminol. Public Policy. 16(1), 99–117 (2017)
5. Cerqueira, D., Lima, R., Bueno, S., Neme, C., Ferreira, H., Coelho, D., Alves, P., Pinheiro, M., Astolfi, R., Marques, D., Reis, M., Merian, F.: Atlas da Violência. Ipea and Brazilian Forum on Public Security (2018)