[1] Afolabi, I., Taleb, T., Samdanis, K., Ksentini, A., & Flinck, H. (2018). Network slicing and softwarization: "A survey on principles, enabling technologies, and solutions." IEEE Communications Surveys & Tutorials, 20(3), 2429-2453.
[2] Zhang, H., Liu, N., Chu, X., Long, K., Aghvami, A. H., & Leung, V. C. (2017). Network slicing based 5G and future mobile networks: "mobility, resource management, and challenges." IEEE communications magazine, 55(8), 138-145.
[3] Ye, Qiang, and Weihua Zhuang. "Intelligent Resource Management for Network Slicing in 5G and Beyond."
[4] Rommer, S., Hedman, P., Olsson, M., Frid, L., Sultana, S., & Mulligan, C. (2019). "5G Core Networks: Powering Digitalization. Academic Press."
[5] Haber and W. S. Stornetta, "How to time-stamp a digital document," in Conference on the Theory and Application of Cryptography, 1990, pp. 437–455.
[6] Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," Manubot, 2019.
[7] Foukas, X., Patounas, G., Elmokashfi, A., & Marina, M. K. (2017). "Network slicing in 5G: Survey and challenges." IEEE Communications Magazine, 55(5), 94-100.
[8] Togou, M. A., Bi, T., Dev, K., McDonnell, K., Milenovic, A., Tewari, H., & Muntean, G. M. (2020). DBNS: "A Distributed Blockchain-Enabled Network Slicing Framework for 5G Networks." IEEE Communications Magazine, 58(11), 90-96.
[9] Morgan, J. P. (2016). "Quorum whitepaper."New York: JP Morgan Chase.
[10] He, Guobiao, Wei Su, Shuai Gao, Ningchun Liu, and Sajal K. Das. "NetChain: A Blockchain-Enabled Privacy-Preserving Multi-Domain Network Slice Orchestration Architecture." IEEE Transactions on Network and Service Management 19, no. 1 (2021): 188-202.
[11] Ssengonzi, C., Kogeda, O. P., & Olwal, T. O. (2022). A survey of deep reinforcement learning application in 5G and beyond network slicing and virtualization. Array, 100142.
[12] R. Sama, X. An, Q. Wei, and S. Beker, "Reshaping the mobile core network via function decomposition and network slicing for the 5G Era," in Proc. IEEE Wireless Commun. Netw. Conf., pp. 1-7, Apr. 2016.
[13] Cunha, V. A., da Silva, E., de Carvalho, M. B., Corujo, D., Barraca, J. P., Gomes, D., ... & Aguiar, R. L. (2019). "Network slicing security: Challenges and directions."Internet Technology Letters, 2(5), e125.
[14] Nour, B., Ksentini, A., Herbaut, N., Frangoudis, P. A., & Moungla, H. (2019). "A blockchain-based network slice broker for 5G services. " IEEE Networking Letters, 1(3), 99-102.
[15] Backman, J., Yrjölä, S., Valtanen, K., & Mämmelä, O. (2017, November). "Blockchain network slice broker in 5G: Slice leasing in factory of the future use case. " In 2017 Internet of Things Business Models, Users, and Networks (pp. 1-8). IEEE.
[16] Papageorgiou, A., Fernández-Fernández, A., Siddiqui, S., & Carrozzo, G. (2020). "On 5G network slice modelling: Service-, resource-, or deployment-driven?." Computer Communications, 149, 232-240.
[17] Faisal, Tooba, Mischa Dohler, Simone Mangiante, and Diego R. Lopez. "BEAT: Blockchain-Enabled Accountable and Transparent Network Sharing in 6G." IEEE Communications Magazine 60, no. 4 (2022): 52-56.
[18] Ssengonzi, C., Kogeda, O. P., & Olwal, T. O. (2022). A survey of deep reinforcement learning application in 5G and beyond network slicing and virtualization. Array, 100142.
[19] Hewa, Tharaka Mawanane, Ivana Kovacevic, Pawani Porambage, Nisita Weerasinghe, Madhusanka Liyanage, Erkki Harjula, and Mika Ylianttila. "Blockchain-based Network Slice Broker to Facilitate Factory-as-a-Service." IEEE Transactions on Industrial Informatics (2022).
[20] He, Yunhua, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, and Hong Li. "Cross-chain Trusted Service Quality Computing Scheme For Multi-chain Model-based 5G Network Slicing SLA." IEEE Internet of Things Journal (2021).
[21] صبا اسعد; امیر مسعود ربیعی. "الگوریتم جدید انتخاب آنتن در سیستمهای چندورودی-چندخروجی کلان". مجله مهندسی برق دانشگاه تبریز, 50, 3, 1399, 1003-1010.
[22] رضا هنرور; علیرضا ذوالقدر اصلی. "تحلیل ارزیابی کارایی الگوریتمهای انتخاب شبکه در شبکههای بیسیم ناهمگن نسل پنجم". مجله مهندسی برق دانشگاه تبریز, 50, 2, 1399, 963-975.
[23] Zeinali, V., & Khaleghi Bizaki, H. (2016). Shared secret key generation protocol in wireless networks based on the phase of MIMO fading channels. Wireless Personal Communications, 89, 1315-1334.