[1] S.H.C. Haris, R.B. Ahmad, and M.A.H.A. Ghani, “Detecting TCP SYN flood attack based on anomaly detection,” 2nd International Conference on Network Applications, Protocols and Services, pp. 240-244, 2010.
[2] M. Korczynski, L. Janowski, and A. Duda, “An accurate sampling scheme for detecting SYN flooding attacks and port scans,” ICC, pp. 1-5, 2011.
[3] N.B.I. Al-Dabagh, and I.A. Ali, “Design and implementation of artificial immune system for detecting flooding attacks,” High Performance Computing & Simulation-HPCS, pp. 381-390, 2011.
[4] Bo Yang, and X. Wang, “Selection of parameter for SYN flood source-end detection,” Electronic & Mechanical Engineering and Information Technology, pp. 106-109, 2011.
[5] S.G. Bhirud, and V. Katkar, “SYN flood attack prevention using main-memory database management system,” Internet (AH-ICI), 2nd Asian Himalayas, pp. 1-6, 2011.
[6] L. Arshadi, and A. Jahangir, “Entropy based SYN flooding detection,” Local Computer Networks, pp. 139-142, 2011.
[7] H. Safaa, A collaborative defense mechanism against SYN flooding attacks in IP networks,” Journal of Network and Computer Applications, vol. 31, pp. 509–534, 2008.
[8] B. Xiao, W. Chen, and Y. He, “An autonomous defense against SYN flooding attacks: detect and throttle attacks at the victim side independently,” Journal of Parallel and Distributed Computing Archive, vol. 68 no. 4, pp. 456-470, 2008.
[9] T. Kim, Y. Choi, J. Kim, and S. Je Hong, “Annulling SYN flooding attacks with whitelist,” Advanced Information Networking and Applications - Workshops, 2008.
[10] Y.W. Chen, “Study on the prevention of SYN flooding by using traffic policing,” Network Operations and Management Symposium, 2000.
[11] Q. Xiaofeng, H. Jihong, and C. Ming, “A mechanism to defend SYN flooding attack based on network measurement system,” Information Technology: Research and Education, 2004.
[12] S. Khan, and I. Traore, “Queue-based analysis of DoS attacks,” Proc. Int. Conf. on IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 266–273, 2005.
[13] Y. Wang, C. Lin, Q. Li, and Y. Fang, “A queueing analysis for the denial of service (DoS) attacks in computer network,” Computer Networks, vol. 51, pp. 3564–3573, 2007.
[14] S.A. Crosby, and Dan S. Wallach, “Denial of service via algorithmic complexity attacks,” USENIX Security Symposium, 2003.
[15] S.H. Zahiria, and S.A. Seyedin, Swarm intelligence based classifiers,” Franklin Institute, 2007.
[16] J. Kennedy, and R. Eberhart, “Particle swarm optimization,” IEEE Neural Networks, 1995.
[17] R.C. Gonzalez, and R.E. Wood, Digital Image Processing. Prentice Hall, 2002.
[18] S. Sadeghi, et al., “An efficient method for impulse noise reduction from images using fuzzy cellular automata,” Int. J. Electron. Commun., vol. 66, pp. 772– 779, 2012.
[19] S. Tavassoli, A. Rezvanian, and M.M. Ebadzadeh, “A new method for impulse noise reduction from digital images based on adaptive neuro-fuzzy system and fuzzy wavelet shrinkage,” Proc. Int. Conf. on Computer Engineering and Technology (ICCET), vol. 4, pp. 297-301, 2010.
[20] A. Rezvanian, K. Faez, and F. Mahmoudi, “A two-pass method to impulse noise reduction from digital images based on neural networks,” Proc. Int. Conf. on Computer Engineering, pp. 400–5, 2008.
[21] I. Turkmen, “Efficient impulse noise detection method with ANFIS for accurate image restoration,” Int. J. Electron Commun. (AEU), vol. 65, pp. 132–9, 2010.
[22] P.L. Rosin, “Image processing using 3-state cellular automata,” Comp Vision Image Unders, Vol. 114, pp. 790–802, 2010.
[23] I. Kalaykov, and G. Tolt, “Real-time image noise cancellation based on fuzzy similarity,” Fuzzy Filters for Image Processing, Springer, pp. 54–71, 2003.
[24] F. Farbiz, and M.B. Menhaj, “A fuzzy logic control based approach for image filtering,” Fuzzy Techniques in Image Processing, Springer, pp. 194–221, 2000.
[25] F. Russo, “FIRE operators for image processing,” Fuzzy Sets Syst, vol. 103, pp. 265–275, 1999.
[26] F. Russo, and G. Ramponi, “A fuzzy filter for images corrupted by impulse noise,” IEEE Signal Process Lett, vol. 3, no. 6, pp. 168–70, 1996.
[27] A. Rezvanian, S. Rezvanian, and H. Khotanlou, “A new method to impulse noise reduction from medical images using cellular automata,” Proc. Int. Conf. on Electrical Engineering, ICEE, vol. 8. pp. 53–8, 2009.
[28] M. Bekravi, S. Jamali, and G. Shaker, “Defense against SYN-Flood denial of service attacks based on learning automata,” International Journal of Computer Science, vol. 9, no. 3, pp. 514-520, 2012.