Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp.114-120, 2013. ,
DOI : 10.1109/AINA.2013.66
Complete study on distributed denial of service attacks in the presence of clock drift, International Conference on Information Communication and Embedded Systems (ICICES2014), pp.1-6, 2014. ,
DOI : 10.1109/ICICES.2014.7033764
Wikileaks website back online after DDoS cyber-attack, [Available at: http://www.bbc.co.uk/news/technology- 19255026, 2015. ,
[Available at: http://www.corero.com/company/newsroom/press-releases/-corero- network-security-reports-on-top-5-ddos-attacks-of, 2011. ,
A Survey of Botnet and Botnet Detection, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.268-273, 2009. ,
DOI : 10.1109/SECURWARE.2009.48
Detecting TCP SYN Flood Attack Based on Anomaly Detection, 2010 Second International Conference on Network Applications, Protocols and Services, pp.240-244, 2010. ,
DOI : 10.1109/NETAPPS.2010.50
A Survey of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.266-282, 2013. ,
DOI : 10.1109/SURV.2013.050113.00191
Ontological classification of network denial of service attacks: Basis for a unified detection framework, Sci. Iran, vol.17, issue.2, pp.133-148, 2010. ,
Denial of Service Attacks in Wireless Networks: The Case of Jammers, IEEE Communications Surveys & Tutorials, vol.13, issue.2, pp.245-257, 2011. ,
DOI : 10.1109/SURV.2011.041110.00022
A survey on network security and attack defense mechanism for wireless sensor networks, Int. J. Comput. Trends Technol, 2011. ,
Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19, 2010. ,
DOI : 10.5121/ijasuc.2010.1301
A survey on the applicability of trust management systems for wireless sensor networks, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp.25-30, 2007. ,
Watchdog-LEACH: A new method based on LEACH protocol to secure clustered wireless sensor networks, Adv. Comput. Sci. An Int. J, vol.2, issue.3, pp.105-117, 2013. ,
Detecting denial of service attacks in sensor networks, J. Comput, vol.4, issue.18, 2008. ,
Optimal sensor placement for detection against distributed denial of service attacks, Proceedings of the 2009 International Conference on Advanced Computer Control, pp.675-679, 2009. ,
Distributed detection of node capture attacks in wireless networks, Smart Wireless Sensor Networks, pp.345-360, 2010. ,
An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Computers & Mathematics with Applications, vol.60, issue.2, pp.294-306, 2010. ,
DOI : 10.1016/j.camwa.2009.12.035
Denial of service attack-resistant flooding authentication in wireless sensor networks, Computer Communications, vol.33, issue.13, pp.1531-1542, 2010. ,
DOI : 10.1016/j.comcom.2010.03.027
Review and evaluation of security threats on the communication networks in the smart grid, 2010, MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, pp.1830-1835, 2010. ,
DOI : 10.1109/MILCOM.2010.5679551