1. The privacy implications of cyber security systems: A technological survey;Toch;ACM Computing Surveys (CSUR),2018
2. User security authentication protocol in multi gateway scenarios of the Internet of Things;Zhao;Ad. Hoc. Netw.,2024
3. ALSNAP: Attention-based long and short-period network security situation prediction;Zhao;Ad. Hoc. Netw.,2023
4. Comprehensive study of symmetric key and asymmetric key encryption algorithms;Yassein,2017
5. Ebrahim, Mansoor, Shujaat Khan, and Umer Bin Khalid. "Symmetric algorithm survey: a comparative analysis." arXiv preprint (2014).