1. Adjoutah, S., & Chelouche, O. (2013). Sécurité contre l’attaque Sybil dans les réseaux de capteurs sans fils (Doctoral dissertation). Université Abderrahmane Mira-Bejaia.
2. A taxonomy of internal attacks in wireless sensor network.;M. R.Ahmed;Memory (Kbytes),2012
3. Data aggregation in wireless sensor networks - exact and approximate algorithms
4. Alam, S., & De, D. (2014). Analysis of security threats in wireless sensor network. arXiv preprint arXiv:1406.0298
5. Anderson, R., Chan, H., & Perrig, A. (2004, October). Key infection: Smart trust for smart dust. In Network Protocols, 2004. ICNP 2004.Proceedings of the 12th IEEE International Conference on (pp. 206-215). IEEE.