[1]
“Adaptive Cryptographic Orchestration Against Learning-Enabled Adversaries”, ijeetr, vol. 6, no. 2, pp. 7830–7837, Mar. 2024, doi: 10.15662/IJEETR.2024.0602006.