1 P. Michiardi, "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks" 2002
2 Panagiotis Papadimitratos, "Secure Routing for Mobile Ad Hoc Networks" 2002
3 F. Kargl, "Secure Dynamic Source Routing" 2005
4 G. Zapata, "Secure Ad Hoc On-Demand Distance Vector(SAODV) Routing"
5 S. Buchegger, "Performance Analysis of the CONFIDANT Protocol" 226-236, 2002
6 S. Buchegger, "Nodes Bearing Grudges : Towards Routing Security, Fairness and Robustness in Mobile Ad Hoc Networks" 403-410, 2002
7 C. K. Toh, "Next-Generation Tactical Ad Hoc Mobile Wireless Networks" (Spring) : 103-113, 2002
8 S. Marti, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks" 255-265, 2000
9 J. Brand, "Management of Tactical Ad Hoc Networks with C2 Data Models" 915-922, 2002
10 Aikaterini Mitrokotsa, "Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks" 2006
1 P. Michiardi, "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks" 2002
2 Panagiotis Papadimitratos, "Secure Routing for Mobile Ad Hoc Networks" 2002
3 F. Kargl, "Secure Dynamic Source Routing" 2005
4 G. Zapata, "Secure Ad Hoc On-Demand Distance Vector(SAODV) Routing"
5 S. Buchegger, "Performance Analysis of the CONFIDANT Protocol" 226-236, 2002
6 S. Buchegger, "Nodes Bearing Grudges : Towards Routing Security, Fairness and Robustness in Mobile Ad Hoc Networks" 403-410, 2002
7 C. K. Toh, "Next-Generation Tactical Ad Hoc Mobile Wireless Networks" (Spring) : 103-113, 2002
8 S. Marti, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks" 255-265, 2000
9 J. Brand, "Management of Tactical Ad Hoc Networks with C2 Data Models" 915-922, 2002
10 Aikaterini Mitrokotsa, "Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks" 2006
11 Y. Zhang, "Intrusion Detection in Wireless Ad-Hoc Networks" Mobile Computing and Networking 275-283, 2000
12 Oscar F. Gonzalez, "Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-hoc Networks" 2 (2): 2008
13 Y. Hu, "Ariadne:A Secure On-Demand Routing Protocol for Ad Hoc Network" 2002
14 Jaydip Sen, "An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks" 571-576, 2009
15 C. E. Perkins, "Ad Hoc On-Demand Distance Vector(AODV)Routing" 1999
16 Jaydip Sen, "A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks" CoRR 2010
17 Chin-Yang Tseng, "A Specification-Based Intrusion Detection Model for OLSR" 330-350, 2006
18 K. Sanzgiri, "A Secure Routing Protocol for Ad Hoc Networks" 2002