1. Marrocco, G.: Pervasive electromagnetics: sensing paradigms by passive RFID technology. IEEE Wirel. Commun. 17(6), 10–17 (2010)
2. Goldstein, B.S., Kucheryavy, A.E.: Post-NGN communication networks. Inf. Control Syst. 6(4), 160–172 (2013)
3. Brutlag, J.D.: Aberrant behavior detection in time series for network monitoring. In: Proceeding of the 14th Systems Administration Conference, pp. 139–146 (2000)
4. Thottan, M., Chuanyi, J.: Anomaly detection in IP networks. IEEE Trans. Sig. Proc. 8(51), 2191–2204 (2003)
5. Wang, H., Zhang, D., Shin, K.G.: Detecting SYN flooding attacks. Proc. IEEE INFOCOM. 6(23), 1530–1539 (2002)