1. Arif MA, Mohammad AA, Sastry MK, Bankapalli J (2022) "Brute Force Attack on Distributed data Hiding in the Multi-Cloud Storage Environment More Diminutive than the Exponential Computations," Ingenierie des System d’Information, Vol 27, no, 6, pp. 915–921, Dec
2. A novel image cryptosystem using Gray code, quantum walks, and Henon map for cloud applications;Abd-El-Atty B;Complex & Intelligent Systems
3. Gadde S, Amutharaj J, Usha S (2023) “A security model to protect the isolation of medical data in the cloud using hybrid cryptography,” Journal of Information Security and Applications, Vol 73, pp. 103412, Mar.
4. Makhdoom I, Abolhasan M, Lipman J (May 2022) A comprehensive survey of covert communication techniques, limitations and future challenges. Computers & Security, p 102784
5. Abdul A, Mohammad et al (Sep 2022) Enhancing Security of Mobile Cloud Computing by Trust-and Role-. Based Access Control." Scientific Programming