“…Most of the reviewed papers addressing recommendations presented secondary studies (e.g., [69,134]). Examples of general recommendations are listed below: Other recommendations include the usage of intrusion detection systems [6,20,36,[135][136][137], threat detection systems [65], early warning systems [138], anomaly detection systems [61], code clone detection [44], post-quantum cryptography [69], lightweight cryptography [37,68,134,139,140], temporary identity [141], authentication [4,7,9,49,52,70,79,108,142], authorization [78], blockchain [30,38,76,[143][144][145], perception layer security [10,146,147], covert timing channels [148], end-to-end security [149], key management [34], secure exchanging data [26], and frequent key update [150].…”