[1]
M. Domb, B. C. G., M. S., G. A., and S. Joshi, “Securing 5G Networks by Mitigating Cybersecurity Risks for Transformative Applications”, Int. J. Interact. Mob. Technol., vol. 19, no. 11, pp. pp. 227–255, Jun. 2025.