References
- A. Petosa. (2018). Engineering the 5G Environment. 2018 IEEE 5G World Forum (5GWF). DOI :10.1109/5gwf.2018.8516930
- E. Dahlman, S. Parkvall & J. Skold. (2018). 5G Standardization. 5G NR: The Next Generation Wireless Access Technology, 7-25. DOI :10.1016/b978-0-12-814323-0.00002-8
- T. Yoo. (2016). Network slicing architecture for 5G network. 2016 International Conference on Information and Communication Technology Convergence (ICTC). DOI :10.1109/ictc.2016.7763354
- T. Wolf. (n.d.). Kr (Krypton). Ac - Na Landolt-Bornstein - Group III Condensed Matter, 352-352. DOI:10.1007/10332996_91
- 5G Network Planning and Optimization. (2019). 5G Explained, 255-269. DOI:10.1002/9781119275695.ch9
- D. J. Bernstein. (n.d.). Introduction to post-quantum cryptography. Post-Quantum Cryptography, 1-14. DOI :10.1007/978-3-540-88702-7_1
- P. Kok & B. W. Lovett. (n.d.). Quantum communication with continuous variables. Introduction to Optical Quantum Information Processing, 255-293. DOI : 10.1017/cbo9781139193658.009
- J. Lee & Y. Kwak. (2016). 5G Standard Development: Technology and Roadmap. Signal Processing for 5G, 561-576. DOI :10.1002/9781119116493.ch23
- 5G Technology Revolution. (2017). International Journal of Modern Trends in Engineering & Research, 4(12), 135-140. DOI:10.21884/ijmter.2017.4394.2tmix
- K. Asatani. (2018). Trends and Issues in 5G Networking and Beyond. Journal of ICT Standardization, 5(3), 203-224. DOI : 10.13052/jicts2245-800x.531
- S. Hong, (2014). Research on Wireless Sensor Networks Security Attack and Countermeasures : Survey. Convergence Society for SMB, 4(4), 1-6
- E. Choi. (2018). Visualization Management Convergence Access Control Model for Cloud Environments. Journal of Convergence for Information Technology, 8(5), 69-75 https://doi.org/10.22156/CS4SMB.2018.8.5.069
- D. Yeom. (2018). Remote Control of Network-based Modular Robot. Journal of Convergence for Information Technology, 8(5), 77-83 https://doi.org/10.22156/CS4SMB.2018.8.5.077
- Y. Jeong. (2018). User Privacy Management Model using Multiple Group Factor based on Blockchain. Journal of Convergence for Information Technology, 8(5), 107-113 DOI : 10.22156/CS4SMB.2018.8.5.107
- K. I. Kim, (2018). Differences Between Client's and Supplier's receptions of IT Outsourcing Risks. Journal of Convergence for Information Technology, 8(5), 237-242. DOI : 10.22156/CS4SMB.2018.8.5.237
- S. Anamalamudi, A. R. Sangi, M. Alkatheiri, F. T. B. Muhaya & C. Liu. (2018). 5G-WLAN Security. A Comprehensive Guide to 5G Security, 143-163. DOI : 10.1002/9781119293071.ch7