1. https://www.gartner.com/en/conferences/hub/cloud-conferences/insights/when-cloud-meets-covid-19-threats-opportunities [Accessed on 03 September 2021]
2. M. R. N. Torkaman, N.S. Kazazi, and A. Rouddini, “Innovative approach to improve hybrid cryptography by using DNA steganography,” International Journal of New Computer Architectures and their Applications, vol. 2, no. 1, pp. 224–235, 2012.
3. D. Nixon, “DNA and DNA computing in security practices-is the future in our genes?,”. Available:https://www.giac.org/paper/gsec/1617/dna-dna-computing-security-practices-future-genes/102969 [Accessed on 30 November 2020]
4. M. Yamuna and A. Elakkiya, “Codons in datasafe transfer,” International Journal of Engineering, vol. 2, pp. 85–90, 2015.
5. J. Ashok, Y. Raju, S.Munishankaraiah, and K.Srinivas, “Steganography: An overview,” International Journal ofEngineering Science and Technology, vol. 2, no. 10, pp. 5985–5992, 2010.