References [1] A. N. Al- Quzweeni , A. Q. Lawey , T. E. Elgorashi , and J. M. Elmirghani , "Optimized energy aware 5G network function virtualization," Ieee Access, vol. 7, pp. 44939-44958, 2019. [2] I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe , A. Gurtov , and M. Ylianttila , "Security for 5G and beyond," IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3682-3722, 2019. [3] A. Y. Abdelkerım , "Handover performance for LTE-A and beyond heterogeneous networks," Kocaeli Üniversitesi , Fen Bilimleri Enstitüsü , 2019. [4] N. A. Ezz-Eldien , H. M. Abdel-Atty, M. I. Abdalla, K. R. Mahmoud, and M. F. Abdelkader, "An adaptive optimized handover decision model for heterogeneous networks," Plos one, vol. 18, no. 11, p. e0294411, 2023. [5] S. F. Ahmed et al., "Towards a secure 5G-enabled Internet of Things: A survey on requirements, privacy, security, challenges, and opportunities," IEEE Access, 2024. [6] Z. S. Hammed, S. Y. Ameen, and S. R. Zeebaree , "Massive MIMO-OFDM performance enhancement on 5G," in 2021 International Conference on Software, Telecommunications and Computer Networks ( SoftCOM ), 2021: IEEE, pp. 1-6. [7] H. A. Alamri , V. Thayananthan , and J. Yazdani, "Machine Learning for Securing SDN based 5G network," Int. J. Comput . Appl , vol. 174, no. 14, pp. 9-16, 2021. [8] S. Bhandari and S. Joshi, "Cognitive radio technology in 5G wireless communications," in 2018 2nd IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), 2018: IEEE, pp. 1115-1120. [9] J.-H. Choi and D.-J. Shin, "Generalized RACH-less handover for seamless mobility in 5G and beyond mobile networks," IEEE Wireless Communications Letters, vol. 8, no. 4, pp. 1264-1267, 2019. [10] R. J. Alghawi , Network Slicing in 5G: Admission, Scheduling, and Security. West Virginia University, 2022.