1. Sulaiman, M. A. (2020). Evaluating data mining classification methods performance in internet of things applications. Journal of Soft Computing and Data Mining, 1(2), 11–25.
2. Halunen, K., & Latvala, O. M. (2021). Review of the use of human senses and capabilities in cryptography. Computer Science Review, 39, 100340.
3. Dhawan, S., & Gupta, R. (2021). Analysis of various data security techniques of steganography: A survey. Information Security Journal: A Global Perspective, 30(2), 63–87.
4. Marqas, R. B., Almufti, S. M., & Ihsan, R. R. (2020). Comparing symmetric and asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms. Xi’an Jianzhu Keji Daxue Xuebao/Journal of Xi’an University of Architecture & Technology, 12, 3110–3116.
5. Rehman, M. U., Shafique, A., Khalid, S., & Hussain, I. (2021). Dynamic substitution and confusion-diffusion-based noise-resistive image encryption using multiple chaotic maps. IEEE Access, 9, 52277–52291.