1. Focus: a fog computing-based security system for the internet of things;Alharbi,2018
2. Machine learning in wireless sensor networks: algorithms, strategies, and applications;Alsheikh;IEEE Commun. Surv. Tutor.,2014
3. Anderson, J. P.,. Computer security threat monitoring and surveillance, 1980. last Accessed: November 30, 2008.
4. An optimal multitier resource allocation of cloud ran in 5G using machine learning;Bashir;Trans. Emerg. Telecommun. Technol.,2019
5. Soft set theory and uni–int decision making;Çağman;Eur. J. Oper. Res.,2010