共 38 条
- [1] Ahmed I., 2020, P ICCA 2020 INT C CO
- [2] Al Hwaitat AK, 2020, INT J ADV COMPUT SC, V11, P614
- [3] Al Nafea Roaa, 2021, 2021 International Conference on Information Technology (ICIT), P779, DOI 10.1109/ICIT52682.2021.9491638
- [4] Alamer Maryam, 2021, 2021 International Conference on Information Technology (ICIT), P719, DOI 10.1109/ICIT52682.2021.9491123
- [5] Albuali A., 2020, P CLOUD 2020
- [6] Almaiah M. A., 2020, Int. J. Electr. Comput. Eng. (IJECE), V10, P6461, DOI DOI 10.11591/IJECE.V10I6.PP6461-6471
- [7] Almaiah MA., 2021, Artificial Intelligence and Blockchain for Future Cybersecurity Applications, P217, DOI [10.1007/978-3-030-74575-212, DOI 10.1007/978-3-030-74575-212]
- [8] Almaiah MohammedAmin., 2021, Artificial Intelligence and Blockchain for Future Cybersecurity Applications
- [9] On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1876 - 1889
- [10] Security boundaries in mobile ambients [J]. COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2002, 28 (01) : 101 - 127