· D. Bri, M. Garcia, J. Lloret, and P. Dini, “Real deployments of wireless sensor networks,” in Proceedings of the 3rd International Conference on Sensor Technologies and Applications (SENSORCOMM
· ’09), pp. 415–423, Athens, Greece, June 2009.
· A. Radhika, D. Kavitha, and D. Haritha, “Mobile agent based routing in MANETS—attacks & defences,” Network Protocols and Algorithms, vol. 3, no. 4, pp. 108–121, 2011.
· K. SahadevaiahandP. V.G.D. PrasadReddy, “Impactof security attacks on a new security protocol for mobile ad hoc networks,”Network Protocols andAlgorithms, vol. 3, no.4,pp. 122–140, 2011.
· N. Alrajeh, S. Khan, andB. Shams, “Intrusion detection systems in wireless sensor networks: a review,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 167575, 7 pages, 2013.
· M. S. Sisodia and V. Raghuwanshi, “Anomaly base network intrusion detection by using random decision tree and random projection a fast network intrusion detection technique,” Network Protocols and Algorithms, vol. 3, no. 4, pp. 93–107, 2011.
· N. A. Alrajeh, S. Khan, J. Lloret, and J. Loo, “Artificial neural network based detection of energy exhaustion attacks in wireless sensor networks capable of energy harvesting,” Ad Hoc & SensorWireless Networks, vol. 2013, pp. 1–25, 2013.
· T. H. Lim, Detecting anomalies in wireless sensor networks [Qualifying dissertation], Department of Computer Science, University of York, 2010.
· J. Kim, P. Bentley, C. Wallenta, M. Ahmed, and S. Hailes, “Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm,” in Artificial Immune Systems, vol. 4163 of Lecture Notes in Computer Science, pp. 390–403, Springer, Berlin, Germany, 2006.
· C. Wallenta, J. Kim, P. J. Bentley, and S. Hailes, “Detecting interest cache poisoning in sensor networks using an artificial immune algorithm,” Applied Intelligence, vol. 32, no. 1, pp. 1–26, 2010.
· M. R. Ahmadi, “An intrusion prediction technique based on co-evolutionary im-mune system for network security (CoCo-IDP),” International Journal ofNetwork Security, vol. 9, no. 3, pp.290–300, 2009.