[1]
R. et. al., “To Send a Data from Source to Destination Using Secure CPU Architecture Encryption of Return Addresses through Network Topology Algorithms”, TURCOMAT, vol. 12, no. 3, pp. 5574–5582, Apr. 2021.