1. Mantas, G., Komninos, N., Rodriuez, J., Logota, E., Marques, H.: Security for 5G Communications. Fundamentals of 5G Mobile Networks (2015)
2. Cheskidov, P., Nikolskaia, K., Minbaleev, A.: Choosing the reinforcement learning method for modeling DdoS attacks. In: Proceedings of the International Multi -Conference on Industrial Engineering and Modern Technologies, pp. 1–4. IEEE (2019)
3. NSFOCUS. Vulnerability development trend (2020). http://blog.nsfocus.net
4. Komisarek, M., Pawlicki, M., Kozik, R., Choraś, M.: Machine learning based approach to anomaly and cyberattack detection in streamed network traffic data. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 12(1), 3–19 (2021)
5. Zhe, T., Zhou, H., Li, K., Li, G.: DCTG: degree constrained topology generation algorithm for software-defined satellite network. J. Internet Serv. Inf. Secur. 9(4), 49–58 (2019)