S.H.C. Haris, R.B. Ahmad, and M.A.H.A. Ghani, “Detecting TCP SYN flood attack based on anomaly detection,” 2nd International Conference on Network Applications, Protocols and Services, pp. 240-244, 2010.
 M. Korczynski, L. Janowski, and A. Duda, “An accurate sampling scheme for detecting SYN flooding attacks and port scans,” ICC, pp. 1-5, 2011.
 N.B.I. Al-Dabagh, and I.A. Ali, “Design and implementation of artificial immune system for detecting flooding attacks,” High Performance Computing & Simulation-HPCS, pp. 381-390, 2011.
 Bo Yang, and X. Wang, “Selection of parameter for SYN flood source-end detection,” Electronic & Mechanical Engineering and Information Technology, pp. 106-109, 2011.
 S.G. Bhirud, and V. Katkar, “SYN flood attack prevention using main-memory database management system,” Internet (AH-ICI), 2nd Asian Himalayas, pp. 1-6, 2011.
 L. Arshadi, and A. Jahangir, “Entropy based SYN flooding detection,” Local Computer Networks, pp. 139-142, 2011.
 H. Safaa, A collaborative defense mechanism against SYN flooding attacks in IP networks,” Journal of Network and Computer Applications, vol. 31, pp. 509–534, 2008.
 B. Xiao, W. Chen, and Y. He, “An autonomous defense against SYN flooding attacks: detect and throttle attacks at the victim side independently,” Journal of Parallel and Distributed Computing Archive, vol. 68 no. 4, pp. 456-470, 2008.
 T. Kim, Y. Choi, J. Kim, and S. Je Hong, “Annulling SYN flooding attacks with whitelist,” Advanced Information Networking and Applications - Workshops, 2008.
 Y.W. Chen, “Study on the prevention of SYN flooding by using traffic policing,” Network Operations and Management Symposium, 2000.
 Q. Xiaofeng, H. Jihong, and C. Ming, “A mechanism to defend SYN flooding attack based on network measurement system,” Information Technology: Research and Education, 2004.
 S. Khan, and I. Traore, “Queue-based analysis of DoS attacks,” Proc. Int. Conf. on IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 266–273, 2005.
 Y. Wang, C. Lin, Q. Li, and Y. Fang, “A queueing analysis for the denial of service (DoS) attacks in computer network,” Computer Networks, vol. 51, pp. 3564–3573, 2007.
 S.A. Crosby, and Dan S. Wallach, “Denial of service via algorithmic complexity attacks,” USENIX Security Symposium, 2003.
 S.H. Zahiria, and S.A. Seyedin, Swarm intelligence based classifiers,” Franklin Institute, 2007.
 J. Kennedy, and R. Eberhart, “Particle swarm optimization,” IEEE Neural Networks, 1995.
 R.C. Gonzalez, and R.E. Wood, Digital Image Processing. Prentice Hall, 2002.
 S. Sadeghi, et al., “An efficient method for impulse noise reduction from images using fuzzy cellular automata,” Int. J. Electron. Commun., vol. 66, pp. 772– 779, 2012.
 S. Tavassoli, A. Rezvanian, and M.M. Ebadzadeh, “A new method for impulse noise reduction from digital images based on adaptive neuro-fuzzy system and fuzzy wavelet shrinkage,” Proc. Int. Conf. on Computer Engineering and Technology (ICCET), vol. 4, pp. 297-301, 2010.
 A. Rezvanian, K. Faez, and F. Mahmoudi, “A two-pass method to impulse noise reduction from digital images based on neural networks,” Proc. Int. Conf. on Computer Engineering, pp. 400–5, 2008.
 I. Turkmen, “Efficient impulse noise detection method with ANFIS for accurate image restoration,” Int. J. Electron Commun. (AEU), vol. 65, pp. 132–9, 2010.
 P.L. Rosin, “Image processing using 3-state cellular automata,” Comp Vision Image Unders, Vol. 114, pp. 790–802, 2010.
 I. Kalaykov, and G. Tolt, “Real-time image noise cancellation based on fuzzy similarity,” Fuzzy Filters for Image Processing, Springer, pp. 54–71, 2003.
 F. Farbiz, and M.B. Menhaj, “A fuzzy logic control based approach for image filtering,” Fuzzy Techniques in Image Processing, Springer, pp. 194–221, 2000.
 F. Russo, “FIRE operators for image processing,” Fuzzy Sets Syst, vol. 103, pp. 265–275, 1999.
 F. Russo, and G. Ramponi, “A fuzzy filter for images corrupted by impulse noise,” IEEE Signal Process Lett, vol. 3, no. 6, pp. 168–70, 1996.
 A. Rezvanian, S. Rezvanian, and H. Khotanlou, “A new method to impulse noise reduction from medical images using cellular automata,” Proc. Int. Conf. on Electrical Engineering, ICEE, vol. 8. pp. 53–8, 2009.
 M. Bekravi, S. Jamali, and G. Shaker, “Defense against SYN-Flood denial of service attacks based on learning automata,” International Journal of Computer Science, vol. 9, no. 3, pp. 514-520, 2012.