[1]
S. Sindhuja and M. Valliammai, “An Efficient Method to Discover Transformed Data Leak”, Int. J. Comp. Sci. Eng., vol. 7, no. 4, pp. 261–263, Nov. 2025.