1. Image steganography to facilitate online students account system;Almutairi;Review of Business and Technology Research,2019
2. Secure mobile computing authentication utilizing hash, cryptography and steganography combination;Alotaibi;Journal of Information Security and Cybercrimes Research,2019
3. Cybercrime on transportation airline;Alsaidi;Journal of Forensic Research,2019
4. Sensing e-banking cybercrimes vulnerabilities via smart information sciences strategies;Al-Shaarani;RAS Engineering and Technology,2020
5. Information gathering schemes for collaborative sensor devices;Aly;Procedia Computer Science,2014