1. (Akella et al. 2010) Akella, R., Tang, H., McMillin, B.: Analysis of Information Flow Security in Cyber-Physical Systems. In: Internat. Journal of Critical Infrastructure Protection, Vol. 3, pp. 157–173, 2010
2. (Akyildiz et al. 2002) Akyildiz, I. E., Su, W., Sankkarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. In: Comput. News, Vol. 16, No. 4, pp 393–402, 2002
3. (Avancha 2005) Avancha, S.: A Holistic Approach to Secure Sensor Networks. Ph. D. thesis, 2005
4. (Barika, et al. 2010) Barika, F., Hadjar, K., El-Kadhi, N.: Artificial neural network for mobile IDS solution, In: Security and Management, pp. 271–277, 2010
5. (Bitter et al. 2010) Bitter, C., Elizondo, D. A., Watson, T.: Application of Artificial Neural Networks and Related Techniques to Intrusion Detection. In: IEEE World Congress on Computational Intelligence, pp. 949–954, IEEE Press 2010.