“…• specific types of ERE attacks, such as vampire attacks [1][2][3], denial-of-sleep attacks [4][5][6][7][8], attacks on specific crypto-protocols, causing increased power consumption on their executing devices [9], various jamming attacks [10,11], replay attacks and collision attacks [12], etc. ; • specific applications and systems analyzed for possible ERE attacks, such as attacks on personal portable mobile devices in direct line of sight [13,14], combined attacks on mobile devices, using vulnerabilities of a cellular network server [15], attacks on separately located sensors [16], attacks on mesh networks built on specific network protocols [17], attacks on drones [18], attacks on implantable medical devices, taking into account various ways to replenish their charge [19], etc.…”