1. R. Khan, P. Kumar, D. N. K. Jayakody, and M. Liyanage, "A survey on
security and privacy of 5G technologies: Potential solutions, recent
advancements and future directions," IEEE Communications Surveys
& Tutorials, vol. 22, no. 1, pp. 196-248, 2020. 10.1109/COMST.2019.2933899
2. Indo-Pacifoc Defense, "Response to improvised explosives," 2020.
Available: https://ipdefenseforum.com/ko/2018/01/%EA%B8%89%EC%A1%B0-%ED%8F%AD%EB%B0%9C%EB%AC%BC-%EB%8C%80%EC%9D%91/
3. J. S. Son, "US drones operated in the mainland... Equipped with
ninja bombs to 'hit tweezers'," Chosun Ilbo, 2020. Available:
https://www.chosun.com/site/data/html_dir/2020/01/06/2020010600315.html
4. N. Yasar, F. M. Yasar, and Y. Topcu, "Operational advantages of
using cyber electronic warfare(CEW) in the battlefield," in Proceeding
of SPIE, vol. 8408, p. 8408G-1, 2012. 10.1117/12.919454
5. H. Kim, J. Cho, S. Kim, H. Kwak, C. Jeong, T. Kang, et al., "Smart
EW: Cyber EW," Defense New Technology Trend Analysis, vol. 38,
pp.35-40, Jan. 2016.