1. The evolution of malware;Touchette;Network Security,2016
2. A Survey of Financial Losses Due to Malware;Amin,2016
3. Hiding Code Inside Images: How Malware Uses Steganography;SentinelOne,2019
4. Overview of encryption, signatures, and hash algorithms in .NET 2022. https://learn.microsoft.com/en-us/dotnet/standard/security/cryptographic-services (accessed June 8, 2023).
5. A Novel DWT Based Image Securing Method Using Steganography;Baby;Procedia Computer Science,2015