1. Ahmed, M., Huang, X., Sharma, D.: A taxonomy of internal attacks in wireless sensor network. Memory (Kbytes) 6(2), 427–430 (2012). http://waset.org/journals/waset/v62/v62-77.pdf
2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002). https://doi.org/10.1016/S1389-1286(01)00302-4
3. Al-Shehri, S.M., Loskot, P., Numanoglu, T., Mert, M.: Common Metrics for Analyzing, Developing and Managing Telecommunication Networks, pp. 1–51 (2017). https://arxiv.org/abs/1707.03290
4. Alajmi, N.: Wireless sensor networks attacks and solutions. IJCSIS Int. J. Comput. Sci. Inf. Secur. 12(7), 37–40 (2014)
5. Alam, S., De, D.: Analysis of security threats in wireless sensor network. Int. J. Wirel. Mob. Netw. (IJWMN) 6(2), 35–46 (2014). https://doi.org/10.5121/ijwmn.2014.6204