1. Using the confidentiality, integrity or availability and authentication, authorization, and accounting models to explain cybersecurity Activities;Obiora;Project Management (PM) World Journal,2017
2. Comparative study of different cryptographic algorithms;Hassan;Journal of Information Security,2020
3. Survey on cryptographic block cipher methods to solve the security issues;Lal;International Journal of Engineering and Technology,2017
4. Load Balancing Framework for cross region tasks in cloud computing;Nazir;Computers Materials & Continua,2021
5. Quantum attacks on type-3 generalized feistel scheme and unbalanced feistel scheme with expanding functions;Zhang;Chinese Journal of Electronics,2022