1. Pandey, K., & Swaroop, A. (2011). A comprehensive performance analysis of proactive, reactive and hybrid MANETs routing protocols. International Journal of Computer Science Issues, 8(6), 432–441.
2. Bambal, P. P., & Mehetre, D. C. (2016). Improving performance of delay constraint scheduling protocols for wireless sensor network. IEEE International Conference, 3(10), 1–6.
3. Salem, O., Mehaoua, A., Vaton, S., & Gravey, A. (2009). Flooding attacks detection and victim identification over high speed networks. In Information infrastructure symposium (pp. 1–8).
4. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., et al. (2012). RPL: IPv6 routing protocol for low-power and lossy networks.
https://tools.ietf.org/html/rfc6550
. Accessed 25 Sept 2016.
5. Tartakovsky, A. G., Polunchenko, A. S., & Sokolov, G. (2013). Efficient computer network anomaly detection by changepoint detection methods. IEEE Journal of Selected Topics in Signal Processing, 7(1), 4–11.