1. Gupta, T., Choudhary, G., Sharma, V.: A survey on the security of pervasive online social networks (POSNs). J. Internet Serv. Inf. Secur. (JISIS) 8(2), 48–86 (2018)
2. Applying big data processing and machine learning methods for mobile internet of things security monitoring. J. Internet Serv. Inf. Secur. 54–63 (2018)
3. Choudhary, G., Kim, J., Sharma, V.: Security of 5G-mobile backhaul networks: a survey. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 9(4), 41–70 (2019)
4. Lim, J., Shin, Y., Lee, S., Kim, K., Yi, J.H.: Survey of dynamic anti-analysis schemes for mobile malware. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (2019)
5. Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17(6), 734–749 (2015)