Pathan, A.-S.K., Lee, H.-W. and Hong, C.S. (2006) Security in Wireless Sensor Networks: Issues and Challenges. Proceedings of 8th IEEE ICACT 2006, Volume II, Seon Hong, 20-22 February 2006, 1043-1048.
 Bhatnagar, R. and Shankar, U. (2012) The Proposal of Hybrid Intrusion Detection for Defence of Sync Flood Attack in Wireless Sensor Network. International Journal of Computer Science & Engineering Survey, 3, 31-38.
 Wu, J. and Li, H. (1999) On Calculating Connected Dominating Set for Efficient Routing in Ad-hoc Wireless Networks. Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communication (DIAL’M), Seattle, August 1999, 7-14.
 Haggar, B. (2009) Self-Stabilizing Clustering Algorithm for Ad-hoc Networks. Proceedings of the 5th International Conference on Wireless and Mobile Communications, ICWMC 2009, French Riviera, August 2009, 24-29.
 Ali, K., Sara, M., Belbachir, R., Maaza, Z.M. and Senouci, S.M. (2012) Self-Organization Framework for Mobile Ad-hoc Networks. Proceedings of 8th International conference on Wireless Communications and Mobile Computing, August 2012, 14-22.
 Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F. and Dimitriou, T. (2009) Cooperative Intrusion Detection in Wireless Sensor Networks. Wireless Sensor Networks, 5, 263-278.
 Stetsko, A., Folkman, L. and Matyas, V. (2010) Neighbor-Based Intrusion Detection for Wireless Sensor Networks. Proceedings of International Conference on Wireless and Mobile Communications, Los Alamitos, 420-425.
 Krontiris, I., Dimitriou, T., Giannetsos, T. and Mpasoukos, M. (2008) Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. In: Algorithmic Aspects of Wireless Sensor Networks, Springer, Sophia Antipolis, 150-161.
 Gerrigagoitia, K., Uribeetxeberria, R., Zurutuza, U. and Arenaza, I. (2012) Reputation-Based Intrusion Detection System for Wireless Sensor Networks. Complexity in Engineering (COMPENG), Aachen, 11-13 June 2012, 1-5.
 Krontiris, I., Giantsos, T. and Dimitriou, T. (2008) LIDeA: A Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, ACM, Istanbul, 22-25 September 2008, 1-10.
 Ganeriwal, S., Balzano, L.K. and Srivastava, M.B. (2008) Reputation-Based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks (TOSN), 4, 1-7.
 Bidgoly, A.J. and Ladani, B.T. (2013) Quantitative Verification of Beta Reputation System Using PRISM Probabilistic Model Checker. Proceedings of 10th International ISC Conference on Information Security and Cryptology (ISCISC), Yazd, 29-30 August 2013, 1-6.
 Patwardhan, A., Parker, J., Joshi, A., Iorga, M. and Karygiannis, T. (2005) Secure Routing and Intrusion Detection in Ad Hoc Networks. 3rd IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, Kauai Island, 8-12 March 2005, 191-199.