H. Yang, H. Y. Luo, F. Ye, S. W. Lu and L. X. Zhang, “Security in Mobile Ad Hoc Networks,” IEEE Wireless Communications Challenges and Solutions, Vol. 11, No. 1, 2004, pp. 38-47.
 D. Moore, G. Voelker and S. Savage, “Inferring Internet Denial-of-Service Activity,” 10th ACM USENIX Security Symposium, 2002, pp. 9-22.
 I. Aad, J. P. Hubaux and E. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks,” IEEE/ACM Transactions on Net-working, Vol. 16, No. 4, 2008, pp. 791-802. http://dx.doi.org/10.1109/TNET.2007.904002
 Y. Jing, X. Wang, X. Xiao and G. Zhang, “Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting,” 49th GLOBECOM 2006, San Francisco, November 2006.
 A. Belenky and N. Ansari, “On IP Traceback,” IEEE Communications Magazine, Vol. 41, No. 7, 2003, pp. 142-153. http://dx.doi.org/10.1109/MCOM.2003.1215651
 Y. Jing, X. Wang, L. Zhang and G. Zhang, “Stable Topology Support for Tracing DDoS Attackers in MANET,” 54th GLOBECOM 2011, Houston, December 2011.
 R. Ahlawede, N. Cai, S. R. Li and R. W. Yeung, “Network Information Flow,” IEEE Transactions on Information Theory, 2000.
 Wikipedia. Gaussian Elimination.
 S. Savage, D. Wetherall, A. Karlin and T. Anderson, “Practical Network Support for IP Traceback,” ACM SIGCOMM Computer Communication Review, Vol. 30, No. 4, 2000, pp. 295-306.
 GloMoSim Simulator.
 S. Bellovin, M. Leech and T. Taylor, “ICMP Traceback Messages,” 2001.
 R. Stone, “CenterTrack: An IP Overlay Network for Tracking DoS Floods,” Proceedings of the 2000 USENIX Security Symposium, Denver, CO, July 2000.
 A. C.Snoeren, C. Partridge, L. A. Sanchez and C. E. Jones, “Hash-Based IP Traceback,” Proceedings of the 2001 Conference of Applications, Technologies, Architectures, and Protocols for Computer Communications, August 2001, pp. 3-14.
 V. L. L. Thing and H. C. J. Lee, “IP Traceback for Wireless Ad-Hoc Networks,” 60th IEEE Vehicular Technology Conference, Los Angeles, September 2004.
 Y. Huang and W. Lee, “Hotspot-Based Traceback for Mobile Ad Hoc Networks,” Proceedings of the ACM Workshop on Wireless Security, 2005.
 D. Sy and L. Bao, “CAPTRA: Coordinated Packet Traceback,” Proceedings of the 5th International Conference on Information Processing in Sensor Networks, April 2006, pp. 124-135.
 I.-Y. Kim and K.-C. Kim, “A Resource-Efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter,” International Conference on Convergence and Hybrid Information Technology, 2008, pp. 549-554.
 Y. Kim and A. Helmy, “SWAT: Small World-Based Attacker Traceback in Ad-hoc Networks,” Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous System: Networking and Services, San Diego, July 2005.
 B.-C. Cheng, H. Chen and R.-Y. Tseng, “A Packet Marking with Fair Probability Distribution Function for Minimizing the Convergence Time in Wireless Sensor Networks,” Computer Communications, Vol. 31, No. 18, 2008, pp. 4352-4359.
 B.-C. Cheng, H. Chen and G.-T. Liao, “FBT: An Efficient Traceback Scheme in Hierarchical Wireless Sensor Network”, Security and Communication Networks, Vol. 2, No. 2, 2009, pp.133-144. http://dx.doi.org/10.1002/sec.88
 X. Jin, Y. X. Zhang, Y. Pan and Y. Z. Zhou, “ZSBT: A Novel Algorithm for Tracing DOS Attackers in MANETS,” EURASIP Journal on Wireless Communications and Networking, Vol. 2006, pp. 1-9.
 M.-H. Yang, C.-S. Chiu and S. Shieh, “Tracing Mobile Attackers in Wireless Ad-Hoc Network,” ICIW 2008, pp. 7-12.
 A. K. Das, S. Agrawal and S. Vishwanath, “Algebraic Traceback for Dynamic Networks,” 2009.