1. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of ACM/IEEE International Conference on Information Processing in Sensor Networks, April 26-27, pp. 259–268. ACM, Berkeley (2004)
2. Rieck, K., Laskov, P.: Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 9, 23–48 (2008)
3. Bar El, H.: Introduction to Side Channel Attacks. Discretix Technologies Ltd. (2003)
4. Moya, J.M., et al.: Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps. Sensors 9, 9380–9397 (2009)
5. Banković, Z., Moya, M.J.M., Araujo, A., Fraga, D., Vallejo, J.C., de Goyeneche, J.M.: Distributed Intrusion Detection System for WSNs based on a Reputation System coupled with Kernel Self-Organizing Maps. Int. Comp. Aided Design (to be published)