“METHODS OF HIDING DATA IN COMPUTER NETWORKS: FROM CLASSICS TO IoT AND Ai” (2025) Computer systems and information technologies, (4), pp. 27–34. doi:10.31891/csit-2025-4-3.