[1. Mukherjee, S., C. Beard. A Frameworkfor Ultra-Reliable Low Latency Mission-Critical Communication. – In: Proc. of Wireless Telecommunications Symposium (WTS’17), Chicago, IL, 2017, pp. 1-5.10.1109/WTS.2017.7943546]Search in Google Scholar
[2. Petrov, V., etal. Achieving End-to-End Reliabilityof Mission-Critical Trafficin Softwarized 5G Networks. – IEEE Journalon Selected Areasin Communications, Vol. 36, March 2018, No 3, pp. 485-501.10.1109/JSAC.2018.2815419]Search in Google Scholar
[3. Khoshnevisan, M., V. Joseph, P. Gupta, F. Meshkati, R. Prakash, P. Tinnakornsrisuphap. 5G Industrial Networkswith CoMPfor URLLCand Time Sensitive Network Architecture. – IEEE Journalon Selected Areasin Communications, Vol. 37, April 2019, No 4, pp. 947-959.10.1109/JSAC.2019.2898744]Search in Google Scholar
[4. Porambage, P., J. Okwuibe, M. Liyanage, M. Ylianttila, T. Taleb. Surveyon Multi-Access Edge Computingfor Internetof Things Realization. – IEEE Communications Surveys & Tutorials, Vol. 20, Fourthquarter 2018, No 4, pp. 2961-2991.10.1109/COMST.2018.2849509]Search in Google Scholar
[5. Bekkouche, O., T. Taleb, M. Bagaa. – UAVs Traffic Control Basedon Multi-Access Edge Computing. – In: Proc. of IEEE Global Communications Conference (GLOBECOM’18), Abu Dhabi, United Arab Emirates, 2018, pp. 1-6.10.1109/GLOCOM.2018.8647421]Search in Google Scholar
[6. Markakis, E. K., etal. Efficient Next Generation Emergency Communicationsover Multi-Access Edge Computing. – IEEE Communications Magazine, Vol. 55, November 2017, No 11, pp. 92-97.10.1109/MCOM.2017.1700345]Search in Google Scholar
[7. Yang, J., X. Ji. An Improved Inter-Domain Handover Scheme Basedon Bidirectional Cooperative Relay. – Cyberneticsand Information Technologies, Vol. 13, 2013, No 4, pp.127-138.10.2478/cait-2013-0059]Search in Google Scholar
[8. Kumar, S. A., P. Ilango, G. H. Dinesh. A Modified LEACH Protocolfor Increasing Lifetimeofthe Wireless Sensor Network. – Cyberneticsand Information Technologies, Vol. 16, 2016, No 3, pp. 154-164.10.1515/cait-2016-0040]Search in Google Scholar
[9. Sharma, S., etal. Secure Authentication Protocolfor 5G Enabled IoT Network. – In: Proc. of 5th International Conferenceon Parallel, Distributedand Grid Computing (PDGC’18), Solan Himachal Pradesh, India, 2018, pp. 621-626.10.1109/PDGC.2018.8745799]Search in Google Scholar
[10. Jover, R. P. The Current Stateof Affairsin 5G Securityandthe Remaining Security Challenges. – arXiv:1904.08394c2 [cs. CR\ 18 April 2019, pp. 1-8. https://arxiv.org/pdf/1904.08394.pdf]Search in Google Scholar
[11. 3GPP TS 29.199-4 3rd Generation Partnership Project. Technical Specification Group Core Networkand Terminals. Open Service Access (OSA). Parlay X Web Services. Part 4: Short Messaging Release 9, V9.0.0, 2009.]Search in Google Scholar
[12. Guist, F., etal. MEC Deploymentsin 4Gand Evolutiontowards 5G. – ETSI White Paper, No 24, 2018.]Search in Google Scholar
[13. Kekki, S., etal. MECin 5G Networks. ETSI White Paper, No 28, 2018.]Search in Google Scholar
[14. ETSI GS MEC 003 Mobile Edge Computing (MEC). Frameworkand Reference Architecture, V1.1.1, 2016.]Search in Google Scholar
[15. 3GPP TR 22.824 Technical Specification Group Servicesand System Aspects. Feasibility Studyon 5G Message Servicefor MIoT. Stage 1, Release 16, V16.0.0, 2018.]Search in Google Scholar
[16. 3GPP TS 38.413 Technical Specification Group Radio Access Networks. NG-RAN. NG Application Protocol (NGAP), Release 18, V15.2.0, 2018.]Search in Google Scholar
[17. Zhang, K., T. Liu, D. Cheng. Observabilityof Finite Labeled Transition Systems. – IEEE Transactionson Automatic Control, Vol. 63, June 2018, No 6, pp. 1501-1512.10.1109/TAC.2017.2749380]Search in Google Scholar
[18. Beek, M. H., F. Damiani, S. Gnesi, F. Mazzanti, L. Paolini. Onthe Expressivenessof Modal Transition Systemswith Variability Constraints. – Scienceof Computer Programming, Vol. 169, 2019, pp. 1-17. 10.1016/j.scico.2018.09.006.10.1016/j.scico.2018.09.006]Search in Google Scholar
[19. Escrig, D. de F., J. J. A. Keiren, T. A. C. Willemse. Gamesfor Bisimulationsand Abstraction. – Local Methodsin Computer Science, Vol. 13, 2017, Issue 4:15, pp.1-40.]Search in Google Scholar
[20. Yang, X., J. Katoen, H. Lin, G. Liu, H. Wu. Branching Bisimulationand Concurrent Object Verification. – In: Proc. of 48th Annual IEEE/IFIP International Conferenceon Dependable Systemsand Networks (DSN), Luxembourg City, 2018, pp. 267-278.10.1109/DSN.2018.00037]Search in Google Scholar
[21. Gibson-Robinson, T., P. Armstrong, A. Boulgakov, A. W. Roscoe. FDR3: A Parallel Refinement Checkerfor CSP. – International Journalon Software Toolsfor Technology Transfer. Vol. 2, 2016, Issue 18, pp. 149-167.10.1007/s10009-015-0377-y]Search in Google Scholar
[22. ETSI GS MEC-IEG 006 Mobile Edge Computing. Market Acceleration. MEC Metrics Best Practiceand Guidelines, V1.1.1, 2017.]Search in Google Scholar
[23. ITU-R M.2410-0 Minimum Requirements Relatedto Technical Performancefor IMT-2020 Radio Interface(S), 2017.]Search in Google Scholar
[24. Bertenyi, B., etal. 5G NR Radio Interface. – Journalof ICT Standardization, Vol. 6, May 2018, Issue 1&2, pp. 31-58.]Search in Google Scholar
[25. Cattaneo, G., F. Giust, C. Meani, D. Munaretto, P. Paglierani. Deploying CPU-Intensive Applicationson MECin NFV Systems: The Immersive Video Use Case. – Computers, Vol. 55, 2018, Issue 7, pp.1-20. DOI:10.3390/computers7040055.10.3390/computers7040055]Open DOISearch in Google Scholar
[26. Filippou, M. C., D. Sabella, V. Riccobene. Flexible MEC Service Consumptionthrough Edge Host Zoningin 5G Networks. – Cornell University, Computer Science, Distributed, Paralleland Cluster Computing, 2019, arXiv:1903.01794 [cs. DC].10.1109/WCNCW.2019.8902852]Search in Google Scholar
[27. Liu, J., G. Shou, Y. Liu, Y. Hu, Z. Guo. Performance Evaluationof Integrated Multi-Access Edge Computingand Fiber-Wireless Access Networks. – IEEE Access, Vol. 6, 2018, pp. 30269-30279.10.1109/ACCESS.2018.2833619]Search in Google Scholar