[1] Daniel Minoli and Benedict Occhiogrosso, “Practical Aspects for the Integration of 5G Networks and IoT Applications in Smart Cities Environments”, Wireless Communications and Mobile Computing, Vol. 2019, pp. 1-30, August 2019.
[2] Dai, B. Wang, Y. Yuan, S. Han, C.-L. I, and Z. Wang, “Non-orthogonal multiple access for 5G: Solutions, challenges, opportunities, and future research trends,” IEEE Commun. Mag., vol. 53, no. 9, pp. 74-81, Sep. 2015.
[3] Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future radio access,” in Proc. IEEE 77th Veh. Technol. Conf., Dresden, Germany, Jun. 2013, pp. 1-5.
[4] Dehghani, J. Pourrostam, “Improving Jain Fairness Index and Optimizing Transmitter Power Consumption in NOMA Systems”, Tabriz Journal of Electrical Engineering, vol. 49, no. 2, pp. 577-586, 2019 (in persian).
[5] Ding, Z. Zhao, M. Peng, and H. V. Poor, “On the spectral efficiency and security enhancements of NOMA assisted multicast-unicast streaming,” IEEE Trans. Commun., vol. 65, no. 7, pp. 3151-3163, Jul. 2017.
[6] Mitola and G. Q. Maguire, “Cognitive radio: Making software radios more personal,” IEEE Personal Communications, Vol. 6, No. 4, pp. 13-18, August 1999.
[7] Torabi, N. Mohammadi, “Performance Evaluation of Cooperative Amplify-and-Forward Relaying Systems in a Spectrum Sharing Cognitive Radio with Relay Selection”, Tabriz Journal of Electrical Engineering, online preprint, 2020 (in persian).
[8] Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, “Breaking spectrum gridlock with cognitive radios: An information theoretic perspective,” Proceedings of the IEEE, Vol. 97, No. 5, pp. 894-914, May 2009.
[9] Xu, A. Nallanathan, X. Pan, J. Yang, and W. Liao, “Security-aware resource allocation with delay constraint for NOMA-based cognitive radio network,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 2, pp. 366-376, Feb. 2018.
[10] A. R. Zaidi, C. D. McLernon, M. Ghogho, and M. A. Imran, “Cloud empowered cognitive inter-cell interference coordination for small cellular networks,” IEEE International Conference on Communication Workshop (ICCW 2015), pp. 2218-2224, 2015.
[11] Giuliano, F. Mazzenga, A. Neri, and A. M. Vegni, “Security access protocols in IoT capillary networks,” IEEE Internet Things J., vol. 4, no. 3, pp. 645-657, June 2017.
[12] D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp.1355–1387, Oct 1975.
[13] F. Shortle, J. M. Thompson, D. Gross, and C. M. Harris, Fundamentals of Queueing Theory, 5th Edition, Wiley, New York, 2018.
[14] E. Kankaya and N. Akar, “Solving multi-regime feedback fluid queues,” Stochastic Models, Vol. 24, No. 3, pp. 425-450, 2008.
[15] Akar and K. Sohraby, “Infinite- and finite-buffer Markov fluid queues: A unified analysis,” Journal of Applied Probability, Vol. 41, No. 2, pp. 557-569, June 2004.
[16] Adli Mehr, J. Musevi Niya, and N. Akar, “Queue management for two-user cognitive radio with delay-constrained primary user,” Computer Networks, Vol 142, pp. 1-12, 2018.
[17] G. Bafghi, S. Salimi, B. Seyfe, and M. R. Aref, “Cognitive interference channel with two confidential messages,” International Symposium on Information Theory Its Applications, pp. 952-956, 2010.
[18] Gabry, N. Li, N. Schrammar, M. Girnyk, L. K. Rasmussen, and M. Skoglund, “On the optimization of the secondary transmitter's strategy in cognitive radio channels with secrecy,” IEEE Journal on Selected Areas in Communications, Vol. 32, No. 3, pp. 451-463, March 2014.
[19] Chen and et al, “Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access,” IEEE Journal on Selected Areas in Communications, Vol. 36, No. 4, pp. 788 - 801, April 2018.
[20] Zhang et al, “Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things,” IEEE Access, Vol. 6, pp. 58405 – 58417, October 2018.
[21] Choi, et al, “Minimum power multicast beamforming with superposition coding for multiresolution broadcast and application to NOMA systems,” IEEE Trans. Commun., vol. 63, no. 3, pp. 791-800, March 2015.
[22] Ding et al, “On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming,” IEEE Trans. Commun., vol. 65, no. 7, pp. 3151 - 3163, July 2017.
[23] Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, “Capacity of cognitive interference channels with and without secrecy,” IEEE Transactions on Information Theory, Vol. 55, No. 2, pp. 604-619, February 2009.
[24] E. Koksal, O. Ercetin, and Y. Sarikaya, “Control of wireless networks with secrecy,” IEEE/ACM Transactions on Networking, Vol. 21, No. 1, pp. 324-337, February 2013.
[25] Sarikaya, O. Ercetin, and C. E. Koksal, “Confidentiality-preserving control of uplink cellular wireless networks using hybrid ARQ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 5, pp. 1457-1470, October 2015.
[26] Mao, C. E. Koksal, and N. B. Shroff, “Achieving full secrecy rate with low packet delays: An Optimal Control Approach,” IEEE Journal on Selected Areas in Communications, Vol. 31, No. 9, pp. 1944-1956, September 2013.
[27] Mao, C. E. Koksal, and N. B. Shroff, “Fair rate allocation for broadcast channel with confidential messages,” IEEE Global Conference on Signal and Information Processing, pp. 799-802, 2013.
[28] Sarikaya, C. E. Koksal, and O. Ercetin, “Dynamic network control for confidential multi-hop communications,” IEEE/ACM Transactions on Networking, Vol. 24, No. 2, pp. 1181-1195, April 2016.
[29] Musavian, S. Aïssa, and S. Lambotharan, “Effective capacity for interference and delay constrained cognitive radio relay channels,” IEEE Transactions on Wireless Communications, Vol. 9, No. 5, pp. 1698-1707, May 2010.
[30] Wu and R. Negi, “Effective capacity: A wireless link model for support of quality of service,” IEEE Transactions on Wireless Communications, Vol. 24, No. 4, pp. 630-643, July 2003.
[31] Yang, S. Aïssa, and K. N. Salama, “Spectrum band selection in delay-QoS constrained cognitive radio networks,” IEEE Transactions on Vehicular Technology, Vol. 64, No. 7, pp. 2925-2937, July 2015.
[32] Ma, Y. Ma, and P. Ma, “Delay-QoS-driven secrecy power allocation in underlay secure cognitive radio system,” IEEE 83rd Vehicular Technology Conference (VTC 2016), pp. 1_5, 2016.
[33] M. Elmahdy, A. El-Keyi, T. ElBatt, and K. G. Seddik, “Optimizing cooperative cognitive radio networks performance with primary QoS provisioning,” IEEE Transactions on Communications, Vol. 65, N0. 4, pp. 1451-1463, April 2017.
[34] Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Transactions on Information Theory, Vol. 54, No. 6, pp. 2515-2534, June 2008.
[35] Tunc and N. Akar, “Performance modeling of delay-based dynamic speed scaling,” 9th International Conference on Matrix-Analytic Methods in Stochastic Models, Budapest, Hungry, 2016.
[36] Scheinhardt, N. Van Foreest, and M. Mandjes, “Continuous feedback fluid queues,” Operations Research Letters, Vol. 33, No. 6, pp. 551-559, November 2005.