1. S. Khorashadizadeh, A.R. Ikuesan, V.R. Kebande, Generic 5g infrastructure for IoT ecosystem. In International Conference of Reliable Information and Communication Technology, pp. 451–462, Springer, 2019
2. F. Mendel, T. Peyrin, M. Schl ̈affer, L. Wang, S. Wu, Improved cryptanalysis of reduced ripemd-160. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 484–503, Springer, 2013
3. J.W. Bos, J.A. Halderman, N. Heninger, J. Moore, M. Naehrig, E. Wustrow, Elliptic curve cryptography in practice. In International Conference on Financial Cryptography and Data Security, pp. 157–175, Springer, 2014
4. P. Gary, A road map for digital forensic research. In Digital Forensics Research Workshop, 2001
5. V.R. Kebande, N.M. Karie, R.D. Wario, H. Venter, Forensic profiling of cyber-security adversaries based on incident similarity measures interaction index. In 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), pp. 1–6, IEEE, 2018