1. Huang, Qiang, JohnasCukier, Hisashi Kobayashi, Bede Liu, and Jinyun Zhang. "Fast authenticated key establishment protocols for self-organizing sensor networks." In Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, pp. 141-150. ACM, 2003.
2. Latif, Rabia, Haider Abbas, and Saïd Assar. "Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review." Journal of medical systems 38, no. 11 (2014): 128.
3. Lupu, Teodor-Grigore, I. Rudas, M. Demiralp, and N. Mastorakis. "Main types of attacks in wireless sensor networks." In WSEAS International Conference. Proceedings. Recent Advances in Computer Engineering, no. 9. WSEAS, 2009.
4. Redwan, Hassen, and Ki-Hyung Kim. "Survey of security requirements, attacks and network integration in wireless mesh networks." In New Technologies, Mobility and Security, 2008. NTMS'08., pp. 1-5. IEEE, 2008.
5. Li, Wenchao, Ping Yi, Yue Wu, Li Pan, and Jianhua Li. "A new intrusion detection system based on KNN classification algorithm in wireless sensor network." Journal of Electrical and Computer Engineering 2014 (2014). Harvard
6. Khan, Shafiullah, Kok-Keong Loo, Tahir Naeem, and Mohammad Abrar Khan. "Denial of service attacks and challenges in broadband wireless networks." 8; 7 (2008).
7. Oreku, George S., Jiangzhong Li, and Tamara Pazynyuk. "An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos)." In Proceedings of the 2nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 81-83. ACM, 2007.
8. Rassam, Murad A., MohdAizainiMaarof, and Anazida Zainal. "A survey of intrusion detection schemes in wireless sensor networks." American Journal of Applied Sciences 9, no. 10 (2012): 1636.
9. Seufert, Stefan, and Darragh O'Brien. "Machine learning for automatic defence against distributed denial of service attacks." In Communications, 2007. ICC'07. IEEE International Conference on, pp. 1217-1222. IEEE, 2007.
10. Salmon, Helio Mendes, Claudio M. De Farias, Paula Loureiro, Luci Pirmez, Silvana Rossetto, Paulo Henrique de A. Rodrigues, Rodrigo Pirmez, Flávia C. Delicato, and Luiz Fernando R. da Costa Carmo. "Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques." International journal of wireless information networks 20, no. 1 (2013): 39-66.
11. Modares, Hero, RosliSalleh, and Amirhossein Moravejosharieh. "Overview of security issues in wireless sensor networks." In Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on, pp. 308-311. IEEE, 2011.
12. Shamshirband, Shahaboddin, Ahmed Patel, Nor BadrulAnuar, Miss Laiha Mat Kiah, and Ajith Abraham. "Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks." Engineering Applications of Artificial Intelligence 32 (2014): 228-241.
13. Arunmozhi, S. A., and Y. Venkataramani. "DDoS Attack and Defense Scheme in Wireless Ad hoc Networks." 1106.1287 (2011).
14. Nanda, Rohan, and P. Venkata Krishna. "Mitigating denial of service attacks in hierarchical wireless sensor networks." Network security 2011, no. 10 (2011): 14-18.
15. Jan, Mian, Priyadarsi Nanda, Muhammad Usman, and Xiangjian He. "PAWN: a payload-based mutual authentication scheme for wireless sensor networks." Concurrency and Computation: Practice and Experience (2016).
16. ELBeltagy, Maha, Sarah Mustafa, JariyaUmka, Laura Lyons, Ahmed Salman, Chur-Yoe Gloria Tu, Nikita Bhalla, Geoffrey Bennett, and Peter M. Wigmore. "Fluoxetine improves the memory deficits caused by the chemotherapy agent 5-fluorouracil." Behavioural brain research 208, no. 1 (2010): 112-117.