1. Latif, S., Asim, M., Usman, M., Qadir, J., & Rana, R. (2018). Automating motion correction in multishot MRI using generative adversarial networks.
2. Aksu, H., Uluagac, A. S., & Bentley, E. (2018). Identification of wearable devices with bluetooth. In Transactions on sustainable computing (2018) (p. 1).
3. Zhou, Y., Han, M., Liu, L., He, J. S., & Wang, Y. (2018). INFOCOM 2018 conference on computer communications workshops.
4. Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications Policy, 41, 1027–1038.
5. Giles, M. (2019). Five emerging cyber-threats to worry about in 2019.