1. Weihong Z G Z P H .Network Security Incidents Frequency Prediction Based on Improved Genetic Algorithm and LSSVM[J]. China Communications, 2022, 7(4): 126-131.
2. Nuthall K .Cryptography to guard against hacks from quantum computers[J]. Commercial crime international, 2022, 1(10): 1-10.
3. Teletraffic analysis of energy-efficient intruder detection using hash function techniques in images for remote monitoring in Wireless Sensor Networks[J];Orea-Flores I Y;Computers and Electrical Engineering
4. Efficient full data-path width and serialized hardware structures of SPONGENT lightweight hash function[J];Rashidi B;Microelectronics journal,2021
5. A New Symmetric Image Encryption Scheme Based on Block Level Processing Using Hash Function and AES[J];Thenmozhi R;Preprints,2021