J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attack in sensor networks, Proceedings of the third international symposium on Information processing in sensor networks , IPSN'04, pp.259-268, 2004.
DOI : 10.1145/984622.984660

K. Rieck and P. Laskov, Linear Time Computation of Similarity for Sequential Data, J. Mach. Learn. Res, vol.9, pp.23-48, 2008.

B. El and H. , Introduction to Side Channel Attacks, 2003.

J. M. Moya, Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps, Sensors, vol.9, issue.11, pp.9380-9397, 2009.
DOI : 10.1016/S0925-2312(97)00068-4

URL : http://www.mdpi.com/1424-8220/9/11/9380/pdf

Z. Bankovi?, . Moya, J. M. Moya, A. Araujo, D. Fraga et al., Distributed Intrusion Detection System for WSNs based on a Reputation System coupled with Kernel Self-Organizing Maps

A. Muñoz and . J. Muruzábal, Self-organizing maps for outlier detection, Neurocomputing, vol.18, issue.1-3, pp.33-60, 1998.
DOI : 10.1016/S0925-2312(97)00068-4