[1]
E. A. Abduh, B. A. Al-Fuhaidi, and F. A. Alqasemi, “Authentication Techniques in 5G Network Slicing Security: A Survey”, UST J Eng Tech, vol. 2, no. 2, pp. 17–36, Dec. 2024, doi: 10.59222/ustjet.2.2.2.