1. Pinzon, C.I., De Paz, J.F., Herrero, A., Corchado, E., Bajo, J., Corchado, J.M.: idMAS-SQL: intrusion detection based on MAS to detect and block SQL injection through data mining. Inf. Sci. 231(10), 15–31 (2013).
https://doi.org/10.1016/j.ins.2011.06.020
2. SOBHTS: Wired and wireless intrusion detection system: classifications, good characteristics and state-of-the-art. Comput. Stand. interfaces 28, 670-694 (2006)
3. Gu, L., Jia, D.: Lightweight detection and classification for wireless sensor networks in realistic environments. In: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems (SenSys 2005), pp. 205–217, November 2005
4. Chadli, S., Saber, M., Emharraf, M., Ziyyat, A.: Generation of test-cases of attacks in MANETs. IEEE Xplore Digital Libr. 10, 855–860 (2014).
https://doi.org/10.3844/jcssp.2016.495.501
5. Chadli, S., Saber M., Ziyyat A.: Defining categories to select representative attack test-cases in MANETs. In: Proceeding The 2014 Fourth International Conference on Communication Systems and Network Technologies (CSNT 2014), 7–9 April 2014, Bhopal, MP, India, pp. 658–663. IEEE (2014). ISBN 978-1-4799-3069-2/14/\$31.00c