1. Adee R, Mouratidis H (2022) A dynamic four-step data security model for data in cloud computing based on cryptography and steganography. Sensors 22(3):1109
2. Rajender N, Gopalachari MV (2024) An efficient dimensionality reduction based on adaptive-GSM and transformer assisted classification for high dimensional data. Int J Inf Technol 16(1):403–416
3. Dutta D, Rath S (2024) Innovative hybrid metaheuristic algorithms: exponential mutation and dual-swarm strategy for hybrid feature selection problem. Int J Inf Technol 16(1):77–89
4. Patil RY (2024) A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption. Int J Inf Technol 16(1):181–191
5. Tran AC, Nguyen-Van L, Duong-Trung N (2024) Towards real-time secured IP camera via state machine architecture. Int J Inf Technol 16(1):329–336