[1] A. B. Dehkordi, M. R. Soltanaghaie, F. Z. Boroujeni, “Distributed Denial of Service Attacks Detection in Software Defined Networks,” Jourrnal of Electronical & Cyber Defence, vol. 9, no. 1, pp. 43-59, 2021. (In Persian)
[2] K. Shoshian, A. Mirghadri, “Modeling of Obfuscated Multi- Stage cyber Attacks,” Jourrnal of Electronical & Cyber Defence, vol. 8, no. 2, pp. 61-73, 2020. (In Persian)
[3] M. A. Abam, M. de Berg, M. Farshi, and J. Gudmundsson, “Region-fault tolerant geometric spanners,” Discrete. Comput. Geom., vol. 41, no. 4, pp. 556-582, 2009.
[4] S. Arya, D. M. Mount, and M. Smid, “Randomized and deterministic algorithms for geometric spanners of small diameter,” 35th Annual Symposium on Foundations of Computer Science, 1994.
[5] P. B. Callahan and S. R. Kosaraju, “Faster algorithms for some geometric graph problems in higher dimensions,” fourth annual ACM-SIAM Symposium on Discrete Algorithms, 1993.
[6] P. B. Callahan and S. R. Kosaraju, “A decomposition of multidimensional point sets with applications to nearest-neighbors and body potential fields,” J. ACM., vol. 42, no. 1, pp. 67-90, 1995.
[7] D. Bakhshesh, L. Barba, P. Bose, J.-L. De Carufel, M. Damian, R. Fagerberg, M. Farshi, A. van Renssen, P. Taslakian, and S. Verdonschot, “Continuous Yao graphs,” Comp. Geom-Theor. Appl., vol. 67, pp. 42-52, 2018.
[8] D. Bakhshesh and M. Farshi, “Fault tolerancy of continuous Yao graph of angle less than ,” Inform. Process. Lett., vol. 148, pp. 13-18, 2019.
[9] P. Bose, P. Carmi, M. Farshi, A. Maheshwari, and M. H. M. Smid, “Computing the greedy spanner in near-quadratic time,” Algorithmica, vol. 58, no. 3, pp. 711-729, 2010.
[10] G. Narasimhan and M. Smid, “Geometric spanner networks”, Cambridge University, 2007.