1. Desnitsky, V., Chechulin, A., Kotenko, I., Levshun, D., Kolomeec, M.: Combined design technique for secure embedded devices exemplified by a perimeter protection system. In: SPIIRAS Proceedings, no. 48, pp. 5–31 (2016)
2. Kaur, S., Ataullah, Md, Garg, M.: Security from denial of sleep attack in wireless sensor network. Int. J. Comput. Technol. 4(2), 419–425 (2013)
3. Wainis, M., Kabalan, K., Dandeh, R.: Denial of sleep detection and mitigation. Latest Trends Commun. 3(2), 195–200 (2014)
4. Kaur, S., Ataullah, Md.: Securing wireless sensor network from denial of sleep attack by isolating nodes. Int. J. Comput. Appl. Technol. 103(1), 29–33 (2014)
5. Raymond, D.R.: Denial-of-Sleep Vulnerabilities and Defenses in Wireless Sensor Network MAC Protocols. Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Engineering (2008)