This work is licensed under the Creative Commons Attribution 4.0 International License.
Heejung, Y., Howon, L., & Hongbeom, J. (2017). What is 5g? emerging 5g mobile services and network requirements. Sustainability, 9(10), 1848.Search in Google Scholar
A, A. P., B, N. J., & C, J. K. (2020). The truth about 5g: it’s not (only) about downloading movies faster!. Business Horizons.Search in Google Scholar
Covaci, S., Repetto, M., & Risso, F. (2018). Towards autonomous security assurance in 5g infrastructures. IEICE Transactions on Communications.Search in Google Scholar
Chatterjee, Sheshadri, Kar, Kumar, A., Gupta, & M., P. (2017). Critical success factors to establish 5g network in smart cities: inputs for security and privacy. Journal of Global Information Management.Search in Google Scholar
Sicari, S., Rizzardi, A., & Coen-Porisini, A. (2020). 5g in the internet of things era: an overview on security and privacy challenges. Computer Networks, 179, 107345.Search in Google Scholar
Wasicek, A. (2020). The future of 5g smart home network security is micro-segmentation. Network Security, 2020(11), 11-13.Search in Google Scholar
Rajasoundaran, S., Prabu, A. V., Routray, S., Malla, P. P., Kumar, G. S., & Mukherjee, A., et al. (2022). Secure routing with multi-watchdog construction using deep particle convolutional model for iot based 5g wireless sensor networks. Computer Communications, 187, 71-82.Search in Google Scholar
Nagesha, A. G., Mahesh, G., & Gowrishankar. (2022). Intelligent feature subset selection with machine learning based detection and mitigation of ddos attacks in 5g environment. Journal of Interconnection Networks.Search in Google Scholar
Shrestha, R., Omidkar, A., Roudi, S. A., Abbas, R., & Kim, S. (2021). Machine-learning-enabled intrusion detection system for cellular connected uav networks. Electronics, 10(13).Search in Google Scholar
Gupta, A., Jha, R. K., & Jain, S. (2017). Attack modeling and intrusion detection system for 5g wireless communication network. International Journal of Communication Systems.Search in Google Scholar
Gaber, T., El-Ghamry, A., & Hassanien, A. E. (2022). Injection attack detection using machine learning for smart iot applications. Physical communication(Jun.), 52.Search in Google Scholar
Abdulqadder, I. H., Zhou, S., Zou, D., Aziz, I. T., & Akber, S. M. A. (2020). Multi-layered intrusion detection and prevention in the sdn/nfv enabled cloud of 5g networks using ai-based defense mechanisms. Computer Networks, 107364.Search in Google Scholar
Amaizu, G., Nwakanma, C. I., Bhardwaj, S., Lee, J. M., & Kim, D. S. (2021). Composite and efficient ddos attack detection framework for b5g networks. Computer Networks, 188(1), 107871.Search in Google Scholar