1. [1] Haseeb Ahmad, Sardar Muhammad Usama, Wajahat Hussain, and Muhammad Latif Anjum. A sketch is worth a thousand navigational instructions. Autonomous Robots, pages 1–21, 2021.
2. [2] Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao. Zombiecoin 2.0: managing next-generation bot-nets using bitcoin. International Journal of Information Security, 17(4):411–422, 2018.
3. [3] D Anthony, D Johnson, P Lutz, and B Yuan. A behavior based covert channel within anti-virus updates. In Proceedings of the International Conference on Security and Management (SAM), page 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2012.
4. [4] Matt Burgess. This is why Russia’s attempts to block Telegram have failed. https://www.wired.co.uk/article/telegram-in-russia-blocked-web-app-ban-facebook-twitter-google, April 2018.
5. [5] Sam Burnett, Nick Feamster, and Santosh Vempala. Chipping away at censorship firewalls with user-generated content. In USENIX Security Symposium, pages 463–468. Washington, DC, 2010.