Author:
Aljohani Reham,Bushnag Anas,Alessa Ali
Publisher
Springer Science and Business Media LLC
Reference38 articles.
1. Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., Di Renzo, M.: Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20–27 (2015)
2. Wang, L., Geraci, G.: Physical-layer security in wireless communication networks: a review. IEEE Trans. Veh. Technol. 69(9), 9558–9576 (2020)
3. Fayssal, S., Hariri, S., Al-Nashif, Y.: Anomaly-based behavior analysis of wireless network security. In: 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (Mobiquitous) (2007). IEEE
4. Gaur, P., Tahiliani, M.: Operating systems for IoT devices: a critical survey. In: 2015 IEEE Region 10 Symposium, pp. 397–400 (2015). IEEE
5. Luo, L., Zhang, W., Li, Y., Li, W.: A survey on IoT operating systems towards the convergence of IoT and cloud computing. J. Netw. Syst. Manag. 28(2), 307–332 (2020)