[1] N. NEWS. " 光 躍 時 代 : 淺 談 5G 技 術 及 資 安 威 脅 ." NCC NEWS.
https://nccnews.com.tw/202010/ch2.html (accessed May 24, 2023).
[2] Z. Feng, P. Zhou, Q. Wang, and W. Qi, "A dual-layer zero trust architecture for 5g industry
mec applications access control," in 2022 IEEE 5th International Conference on Electronic
Information and Communication Technology (ICEICT), 2022: IEEE, pp. 100-105.
[3] K. Ramezanpour and J. Jagannath, "Intelligent zero trust architecture for 5G/6G tactical
networks: Principles, challenges, and the role of machine learning," arXiv:2105.01478
[cs.NI], 2021.
[4] F. A. Qazi, "Study of Zero Trust Architecture for Applications and Network Security," in
2022 IEEE 19th International Conference on Smart Communities: Improving Quality of
Life Using ICT, IoT and AI (HONET), 2022: IEEE, pp. 111-116.
[5] 邱昱勳, "適用於oneM2M架構之物聯網分散式阻斷服務攻擊檢測與防治," 國立虎尾
科技大學, 2022.
[6] ZDNET. "Google says it mitigated a 2.54 Tbps DDoS attack in 2017, largest known to
date." ZDNET. https://www.zdnet.com/article/google-says-it-mitigated-a-2-54-tbpsddos-attack-in-2017-largest-known-to-date/ (accessed may 25, 2023).
[7] UNIT42. "Mirai Variant V3G4 Targets IoT Devices." UNIT42.
https://unit42.paloaltonetworks.com/mirai-variant-v3g4/ (accessed JUN 4, 2023).
[8] X. Chen, D. W. K. Ng, W. Yu, E. G. Larsson, N. Al-Dhahir, and R. Schober, "Massive
access for 5G and beyond," IEEE Journal on Selected Areas in Communications, vol. 39,
no. 3, pp. 615-637, 2020.
[9] B. Dorsemaine, J.-P. Gaulier, J.-P. Wary, N. Kheir, and P. Urien, "Internet of things: a
definition & taxonomy," in 2015 9th International Conference on Next Generation Mobile
Applications, Services and Technologies, 2015: IEEE, pp. 72-77.
[10] JavaTpoint. "https://www.javatpoint.com/iot-internet-of-things." JavaTpoint.
https://www.javatpoint.com/iot-internet-of-things (accessed May 23, 2023).
[11] 阿旺. "Day2 物聯網簡介 - iT 邦幫忙::一起幫忙解決難題,拯救 IT 人的一天." 阿
旺. https://ithelp.ithome.com.tw/articles/10216713 (accessed May 23, 2023).
[12] 宅學習 . "4. 產 業 價 值 ( 生 態 ) 鏈 、 物 聯 網 標 準 | 宅學習 ." 宅學習 .
https://sls.weco.net/node/23340 (accessed May 20223, 2023).
[13] R. Mohamed, S. Zemouri, and C. Verikoukis, "Performance evaluation and comparison
between SA and NSA 5G networks in indoor environment," in 2021 IEEE International
Mediterranean Conference on Communications and Networking (MeditCom), 2021: IEEE,
pp. 112-116.
[14] H. Guo, X. Zhao, B. Cai, J. Hou, M. Wei, and X. Xu, "Research on Handover Technology
47
in 5G NSA and SA Hybrid Network," in 2022 IEEE International Symposium on
Broadband Multimedia Systems and Broadcasting (BMSB), 2022: IEEE, pp. 1-5.
[15] E. T. Taiwan. "5G SA開台 多重無線技術測試再添挑戰 - 電子工程專輯." Anthea
Chuang. https://www.eettaiwan.com/20221019nt31-5g-sa-multi-test/ (accessed May 23,
2023).
[16] G. 技嘉科技. "5G | 第五代行動通訊技術 - GIGABYTE 技嘉科技." GIGABYTE 技
嘉科技. https://www.gigabyte.com/tw/Glossary/5g (accessed May 23, 2023).
[17] NIST. "Draft (2nd) SP 800-207, Zero Trust Architecture." NIST.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207-draft2.pdf
(accessed July 8, 2023).
[18] J. B. Michael, G. C. Dinolt, F. B. Cohen, and D. Wijesekera, "Can you trust zero trust?,"
Computer, vol. 55, no. 8, pp. 103-105, 2022.
[19] C. Zhang et al., "Tag-Based Trust Evaluation In Zero Trust Architecture," in 2022 4th
International Academic Exchange Conference on Science and Technology Innovation
(IAECST), 2022: IEEE, pp. 772-776.
[20] J. Kindervag, "Build security into your network’s dna: The zero trust network
architecture," Forrester Research Inc, vol. 27, 2010.
[21] M. Alawneh and I. M. Abbadi, "Integrating trusted computing mechanisms with trust
models to achieve zero trust principles," in 2022 9th International Conference on Internet
of Things: Systems, Management and Security (IOTSMS), 2022: IEEE, pp. 1-6.
[22] B. Zhang, T. Zhang, and Z. Yu, "DDoS detection and prevention based on artificial
intelligence techniques," in 2017 3rd IEEE International Conference on Computer and
Communications (ICCC), 2017: IEEE, pp. 1276-1280.
[23] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other
botnets," Computer, vol. 50, no. 7, pp. 80-84, 2017.
[24] S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural computation, vol.
9, no. 8, pp. 1735-1780, 1997.
[25] S. Prakash, A. S. Jalal, and P. Pathak, "Forecasting COVID-19 Pandemic using Prophet,
LSTM, hybrid GRU-LSTM, CNN-LSTM, Bi-LSTM and Stacked-LSTM for India," in
2023 6th International Conference on Information Systems and Computer Networks
(ISCON), 2023: IEEE, pp. 1-6.
[26] M. A. I. Sunny, M. M. S. Maswood, and A. G. Alharbi, "Deep learning-based stock price
prediction using LSTM and bi-directional LSTM model," in 2020 2nd novel intelligent
and leading emerging sciences conference (NILES), 2020: IEEE, pp. 87-92.
[27] 何文翔, "以SVM分類器辨識人體舞姿之研究," 碩士, 電機工程學系, 國立臺灣海洋大學, 基隆市, 2018. [Online]. Available: https://hdl.handle.net/11296/n3zkb8
[28] A. R. Wani, Q. Rana, U. Saxena, and N. Pandey, "Analysis and detection of DDoS attacks
on cloud computing environment using machine learning techniques," in 2019 Amity
48
International conference on artificial intelligence (AICAI), 2019: IEEE, pp. 870-875.
[29] IT邦幫忙. "[筆記]機器學習技法-支持向量機(Support Vector Machine , SVM)."
Kevin https://ithelp.ithome.com.tw/articles/10231614 (accessed May 25, 2023).
[30] K. Linux. "hping3 | Kali Linux Tools." Kali Linux. https://www.kali.org/tools/hping3/
(accessed May 23, 2023).
[31] Wireshark. "tshark(1) Manual Page." Wireshark. https://www.wireshark.org/docs/manpages/tshark.html (accessed May 23, 2023).
[32] S. R. Systems. "5G NSA srsUE — srsRAN 4G 23.04 documentation." Software Radio
Systems.
https://docs.srsran.com/projects/4g/en/latest/app_notes/source/5g_nsa_amari/source/inde
x.html (accessed May 23, 2023