[1]     S.H.C. Haris, R.B. Ahmad, and M.A.H.A. Ghani, “Detecting TCP SYN flood attack based on anomaly detection,” 2nd International Conference on Network Applications, Protocols and Services, pp. 240-244, 2010.
[2]     M. Korczynski, L. Janowski, and A. Duda, “An accurate sampling scheme for detecting SYN flooding attacks and port scans,” ICC, pp. 1-5, 2011.
[3]     N.B.I. Al-Dabagh, and I.A. Ali, “Design and implementation of artificial immune system for detecting flooding attacks,” High Performance Computing & Simulation-HPCS, pp. 381-390, 2011.
[4]     Bo Yang, and X. Wang, “Selection of parameter for SYN flood source-end detection,” Electronic & Mechanical Engineering and Information Technology, pp. 106-109, 2011.
[5]     S.G. Bhirud, and V. Katkar, “SYN flood attack prevention using main-memory database management system,” Internet (AH-ICI), 2nd Asian Himalayas, pp. 1-6, 2011.
[6]     L. Arshadi, and A. Jahangir, “Entropy based SYN flooding detection,” Local Computer Networks, pp. 139-142, 2011.
[7]     H. Safaa, A collaborative defense mechanism against SYN flooding attacks in IP networks,” Journal of Network and Computer Applications, vol. 31, pp. 509–534, 2008.
[8]     B. Xiao, W. Chen, and Y. He, “An autonomous defense against SYN flooding attacks: detect and throttle attacks at the victim side independently,” Journal of Parallel and Distributed Computing Archive, vol. 68 no. 4, pp. 456-470, 2008.
[9]     T. Kim, Y. Choi, J. Kim, and S. Je Hong, “Annulling SYN flooding attacks with whitelist,” Advanced Information Networking and Applications - Workshops, 2008.
[10]  Y.W. Chen, “Study on the prevention of SYN flooding by using traffic policing,” Network Operations and Management Symposium, 2000.
[11]  Q. Xiaofeng, H. Jihong, and C. Ming, “A mechanism to defend SYN flooding attack based on network measurement system,” Information Technology: Research and Education, 2004.
[12]  S. Khan, and I. Traore, “Queue-based analysis of DoS attacks,” Proc. Int. Conf. on IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 266–273, 2005.
[13]  Y. Wang, C. Lin, Q. Li, and Y. Fang, “A queueing analysis for the denial of service (DoS) attacks in computer network,” Computer Networks, vol. 51, pp. 3564–3573,  2007.
[14]  S.A. Crosby, and Dan S. Wallach, “Denial of service via algorithmic complexity attacks,” USENIX Security Symposium, 2003.
[15]  S.H. Zahiria, and S.A. Seyedin, Swarm intelligence based classifiers,” Franklin Institute, 2007.
[16]  J. Kennedy, and R. Eberhart, “Particle swarm optimization,” IEEE Neural Networks, 1995.
[17]  R.C. Gonzalez, and R.E. Wood, Digital Image Processing. Prentice Hall, 2002.
[18]  S. Sadeghi, et al., “An efficient method for impulse noise reduction from images using fuzzy cellular automata,” Int. J. Electron. Commun., vol. 66, pp. 772– 779, 2012.
[19]  S. Tavassoli, A. Rezvanian, and M.M. Ebadzadeh, “A new method for impulse noise reduction from digital images based on adaptive neuro-fuzzy system and fuzzy wavelet shrinkage,” Proc. Int. Conf. on Computer Engineering and Technology (ICCET), vol. 4, pp. 297-301, 2010.
[20]  A. Rezvanian, K. Faez, and F. Mahmoudi, “A two-pass method to impulse noise reduction from digital images based on neural networks,” Proc. Int. Conf. on Computer Engineering, pp. 400–5, 2008.
[21]  I. Turkmen, “Efficient impulse noise detection method with ANFIS for accurate image restoration,” Int. J. Electron Commun. (AEU), vol. 65, pp. 132–9, 2010.
[22]  P.L. Rosin, “Image processing using 3-state cellular automata,” Comp Vision Image Unders, Vol. 114, pp. 790–802, 2010.
[23]  I. Kalaykov, and G. Tolt, “Real-time image noise cancellation based on fuzzy similarity,” Fuzzy Filters for Image Processing, Springer, pp. 54–71, 2003.
[24]  F. Farbiz, and M.B. Menhaj, “A fuzzy logic control based approach for image filtering,” Fuzzy Techniques in Image Processing, Springer, pp. 194–221, 2000.
[25]  F. Russo, “FIRE operators for image processing,” Fuzzy Sets Syst, vol. 103, pp. 265–275, 1999.
[26]  F. Russo, and G. Ramponi, “A fuzzy filter for images corrupted by impulse noise,” IEEE Signal Process Lett, vol. 3, no. 6, pp. 168–70, 1996.
[27]  A. Rezvanian, S. Rezvanian, and H. Khotanlou, “A new method to impulse noise reduction from medical images using cellular automata,” Proc. Int. Conf. on Electrical Engineering, ICEE, vol. 8. pp. 53–8, 2009.
[28]   M. Bekravi, S. Jamali, and G. Shaker, “Defense against SYN-Flood denial of service attacks based on learning automata,” International Journal of Computer Science, vol. 9, no. 3, pp. 514-520, 2012.