1. Challenges for cloud networking security;P Schoo;Mobile Networks and Management,2011
2. Protecting against distributed denial of service (DDoS) attacks using distributed filtering;J Trostle;Securecomm and Workshops,2006
3. A Scheme to Control Flooding of Fake Route Requests in Adhoc Networks;J Kataria;International Conference on Computers and Devices for Communications,2006