1. Online judge;Kurnia;Comput. Educ.,2001
2. TS-ABOS-CMS: Time-bounded secure attribute-based online/offline signature with constant message size for IoT systems;Hong;J. Syst. Archit.,2022
3. Mustafa, M., Buttar, A.M., Sajja, G.S., Gour, S., Naved, M., and William, P. (2022). Autonomous Vehicles Volume 1: Using Machine Intelligence, IGI Global.
4. Perceived security risk based on moderating factors for blockchain technology applications in cloud storage to achieve secure healthcare systems;Mustafa;Comput. Math. Methods Med.,2022
5. Forišek, M. (2006). Security of programming contest systems. Inf. Technol. Sch., 553–563. Available online: https://www.google.com.hk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj8g_fg_oKAAxWI0GEKHRArB-kQFnoECAsQAQ&url=https%3A%2F%2Fpeople.ksp.sk%2F~misof%2Fpublications%2Fcopy%2F2006attacks.pdf&usg=AOvVaw0n9T9092mp0Rl25bdHy8oC&opi=89978449.