[1]
M. Younis Kashmola, منار, A. Bibo Sallo, and أمیرة, “Information Hiding Techniques Using Network Protocols”, RJCSM, vol. 8, no. 2, pp. 35–50, Jun. 2025.