“…Other proposed solutions address the Physical Layer Security (PLS) for wireless networks [Nasir et al, 2019;Lin et al, 2020b;Dey et al, 2018;Yerrapragada et al, 2019;Li, 2019;Mazin et al, 2017;Yang et al, 2020;Lichtman et al, 2018;Jaiswal et al, 2021;Jiao et al, 2019;Tang et al, 2019;Forouzesh et al, 2019;Song et al, 2018;Zhao et al, 2017;Marabissi et al, 2020;Zhao et al, 2021c;Cheng et al, 2021]. Anomaly/threat detection is another focus of many of the proposed solutions [Ali and Ware, 2021;Priovolos et al, 2021;Nediyanchath et al, 2020;Ketzaki et al, 2019;Xu et al, 2019;Kim et al, 2021a;Lu et al, 2018;Surridge et al, 2018]. Studies also addressed the applicability of forensic solutions to 5G [Nieto, 2018;Ding et al, 2022a], privacy [Khan et al, 2019], and some others focus on the security of legacy networks (only mentioning possible future 5G applications) [Sheoran et al, 2019;Peltonen et al, 2021;Shaik et al, 2018Shaik et al, , 2019Liu et al, 2018;Deng et al, 2018;Baskaran and Raja, 2017].…”