1. M. Liyanage J. Okwuibe M. Ylianttila. I. Ahmad T. Kumar and A. Gurtov.2018. Overview of 5g security challenges and solutions. M. Liyanage J. Okwuibe M. Ylianttila. I. Ahmad T. Kumar and A. Gurtov.2018. Overview of 5g security challenges and solutions.
2. M. Liyanage J. Okwuibe M. Ylianttila . I. Ahmad, T. Kumar and A. Gurtov . Feb 2022 . Enisa threat landscape for 5G networks. M. Liyanage J. Okwuibe M. Ylianttila. I. Ahmad, T. Kumar and A. Gurtov.Feb 2022. Enisa threat landscape for 5G networks.
3. Baig Z. Lam C.P. Hingston Adi , E.2015. Low-rate denial-of-service attacks against http/2 services. Security and Privacy in Communication Networks ( 2015 ), 1–5. Baig Z. Lam C.P. Hingston Adi, E.2015. Low-rate denial-of-service attacks against http/2 services. Security and Privacy in Communication Networks (2015), 1–5.
4. A Survey on Security Aspects for 3GPP 5G Networks
5. A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset