R. Poisel, M. Rybnicek, and S. Tjoa, Game-based Simulation of Distributed Denial of Service (DDoS) Attack and Defense Mechanisms of Critical Infrastructures, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp.114-120, 2013.
DOI : 10.1109/AINA.2013.66

C. Kavitha, Complete study on distributed denial of service attacks in the presence of clock drift, International Conference on Information Communication and Embedded Systems (ICICES2014), pp.1-6, 2014.
DOI : 10.1109/ICICES.2014.7033764

. Bbc-technology and . News, Wikileaks website back online after DDoS cyber-attack, [Available at: http://www.bbc.co.uk/news/technology- 19255026, 2015.

D. Attacks, [Available at: http://www.corero.com/company/newsroom/press-releases/-corero- network-security-reports-on-top-5-ddos-attacks-of, 2011.

M. Feily, A. Shahrestani, and S. Ramadass, A Survey of Botnet and Botnet Detection, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.268-273, 2009.
DOI : 10.1109/SECURWARE.2009.48

S. H. Haris, R. B. Ahmad, and M. A. Ghani, Detecting TCP SYN Flood Attack Based on Anomaly Detection, 2010 Second International Conference on Network Applications, Protocols and Services, pp.240-244, 2010.
DOI : 10.1109/NETAPPS.2010.50

I. Butun, S. D. Morgera, and R. Sankar, A Survey of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.266-282, 2013.
DOI : 10.1109/SURV.2013.050113.00191

A. Varshovi and B. Sadeghiyan, Ontological classification of network denial of service attacks: Basis for a unified detection framework, Sci. Iran, vol.17, issue.2, pp.133-148, 2010.

K. Pelechrinis and M. Iliofotou, Denial of Service Attacks in Wireless Networks: The Case of Jammers, IEEE Communications Surveys & Tutorials, vol.13, issue.2, pp.245-257, 2011.
DOI : 10.1109/SURV.2011.041110.00022

S. K. Singh, M. P. Singh, and D. K. Singh, A survey on network security and attack defense mechanism for wireless sensor networks, Int. J. Comput. Trends Technol, 2011.

M. Momani and S. Challa, Survey of Trust Models in Different Network Domains, International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol.1, issue.3, pp.1-19, 2010.
DOI : 10.5121/ijasuc.2010.1301

M. C. Fernández-gago, R. Román, and J. Lopez, A survey on the applicability of trust management systems for wireless sensor networks, Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp.25-30, 2007.

M. R. Rohbanian, M. R. Kharazmi, A. Keshavarz-haddad, and M. Keshtgary, Watchdog-LEACH: A new method based on LEACH protocol to secure clustered wireless sensor networks, Adv. Comput. Sci. An Int. J, vol.2, issue.3, pp.105-117, 2013.

G. H. Lai and C. Chen, Detecting denial of service attacks in sensor networks, J. Comput, vol.4, issue.18, 2008.

M. H. Islam, K. Nadeem, and S. A. Khan, Optimal sensor placement for detection against distributed denial of service attacks, Proceedings of the 2009 International Conference on Advanced Computer Control, pp.675-679, 2009.

J. Ho, Distributed detection of node capture attacks in wireless networks, Smart Wireless Sensor Networks, pp.345-360, 2010.

P. S. Misra, V. Krishna, K. I. Abraham, N. Sasikumar, and F. S. , An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks, Computers & Mathematics with Applications, vol.60, issue.2, pp.294-306, 2010.
DOI : 10.1016/j.camwa.2009.12.035

J. Son, H. Luo, and S. Seo, Denial of service attack-resistant flooding authentication in wireless sensor networks, Computer Communications, vol.33, issue.13, pp.1531-1542, 2010.
DOI : 10.1016/j.comcom.2010.03.027

Z. Z. Lu, X. Lu, W. Wang, and C. Wang, Review and evaluation of security threats on the communication networks in the smart grid, 2010, MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, pp.1830-1835, 2010.
DOI : 10.1109/MILCOM.2010.5679551