1. T. Anderson and D. Darling, “Asymptotic Theory of Certain “Goodness-of-Fit” Criteria Based on Stochastic Processes,” Annals of Mathematical Statistics, 1952.
2. J. Bellardo, and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions,” in Proc. USENIX Security Symposium, 2003.
3. G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE Journal on Selected Areas of Communication, vol. 18, no. 3, pp. 535–547, Mar. 2000.
4. L. Buttyan and J. Hubaux, “Report on a Working Session on Security in Wireless Ad hoc Networks,” in Mobile Computing and Communications Review, vol. 6, no. 4, 2002.
5. M. Cagalj, S. Ganeriwal, I. Aad and J. Hubaux, “On Selfish Behavior in CSMA/CA Networks,” in Proc. IEEE INFOCOM, 2005.