1. Abdelaziz, A.K., Nafaa, M., Salim, G., 2013. Survey of routing attacks and countermeasures. In: Proceedings of the 15th International Conference on Computer Modelling and Simulation (UKSim). 693–698.
2. Optimal and secure protocols in the IETF 6TiSCH communication stack;Accettura;Ind. Electron. (ISIE) IEEE 23rd Int. Symp.,2014
3. An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing;Airehrour;CONF-IRM 2015,2015
4. A novel coding scheme to implement signature based IDS in IP based Sensor Networks;Amin;Integr Netw Manag-Work, 2009 IM׳09 IFIP/IEEE Int Symp,2009
5. Anderson, R., Kuhn, M., 1996. Tamper resistance: a cautionary note Oakland, California. Present Proceedings of the 2nd Conf Proc Second USENIX Workshop Electron Commer, 2.