H. Yang, H. Y. Luo, F. Ye, S. W. Lu and L. X. Zhang, “Security in Mobile Ad Hoc Networks,” IEEE Wireless Communications Challenges and Solutions, Vol. 11, No. 1, 2004, pp. 38-47. http://dx.doi.org/10.1109/MWC.2004.1269716
 I. Aad, J. P. Hubaux and E. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks,” IEEE/ACM Transactions on Net-working, Vol. 16, No. 4, 2008, pp. 791-802. http://dx.doi.org/10.1109/TNET.2007.904002
 A. Belenky and N. Ansari, “On IP Traceback,” IEEE Communications Magazine, Vol. 41, No. 7, 2003, pp. 142-153. http://dx.doi.org/10.1109/MCOM.2003.1215651
 Wikipedia. Gaussian Elimination. http://en.wikipedia.org/wiki/Gaussian_elimination
 S. Savage, D. Wetherall, A. Karlin and T. Anderson, “Practical Network Support for IP Traceback,” ACM SIGCOMM Computer Communication Review, Vol. 30, No. 4, 2000, pp. 295-306. http://dx.doi.org/10.1145/347057.347560
 GloMoSim Simulator. http://pcl.cs.ucla.edu/projects/glomosim/ography
 S. Bellovin, M. Leech and T. Taylor, “ICMP Traceback Messages,” 2001. http://www3.ietf.org/proceedings/01dec/I-D/draft-ietf-itrace-01.txt
 A. C.Snoeren, C. Partridge, L. A. Sanchez and C. E. Jones, “Hash-Based IP Traceback,” Proceedings of the 2001 Conference of Applications, Technologies, Architectures, and Protocols for Computer Communications, August 2001, pp. 3-14.
 I.-Y. Kim and K.-C. Kim, “A Resource-Efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter,” International Conference on Convergence and Hybrid Information Technology, 2008, pp. 549-554.
 Y. Kim and A. Helmy, “SWAT: Small World-Based Attacker Traceback in Ad-hoc Networks,” Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous System: Networking and Services, San Diego, July 2005.
 B.-C. Cheng, H. Chen and R.-Y. Tseng, “A Packet Marking with Fair Probability Distribution Function for Minimizing the Convergence Time in Wireless Sensor Networks,” Computer Communications, Vol. 31, No. 18, 2008, pp. 4352-4359. http://dx.doi.org/10.1016/j.comcom.2008.03.024
 B.-C. Cheng, H. Chen and G.-T. Liao, “FBT: An Efficient Traceback Scheme in Hierarchical Wireless Sensor Network”, Security and Communication Networks, Vol. 2, No. 2, 2009, pp.133-144. http://dx.doi.org/10.1002/sec.88