1. Bhatia, R., et al.: Security issues prtaining to ad hoc networks-a survey, IJCSMS Int. J. Comput. Sci. Manage. Stud. 12 (2012)
2. Araghi, T.K., Zamani, M., Manaf, A.A., Abdullah, S.M., Bojnord, H.S., Araghi, S.K.: A survey for prevention of black hole attacks in wireless mobile adhoc networks using IDS agents. 12th International Conference on Applied Computer and Applied Computational Science (ACACOS ‘13), Kuala Lumpur, Malaysia, 2–4 April 2013
3. Ghazizadeh, E., Zamani, M.: Cloud computing and single sign on: a literature review. Sci. World J. ISSN: 1537-744X. IF = 1.73. Q1 (Hindawi Publishing Corporation (UR)) (2013)
4. Janbeglou, M., Zamani, M., Ibrahim, S.: Redirecting network traffic toward a fake DNS server on a LAN. 3rd IEEE International Conference on Computer Science and Information Technology, pp. 429–433, Chengdu, China, 9–11 July 2010
5. Janbeglou, M., Zamani, M., Ibrahim, S.: Redirecting Outgoing DNS requests toward a fake DNS server in a LAN. IEEE International Conference on Software Engineering and Service Science, pp. 29–32. Beijing, China, 16–18 July 2010