1 |
L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, Vol.13, No.6, pp.24-30, 1999.
|
2 |
Y. A. Huang and W. Lee, "A cooperative intrusion detection system for ad hoc networks," In the Proc. of 1st ACM Workshop on Ad hoc and Sensor Networks, pp.135-147, 2003.
|
3 |
W. Ren, D. Y. Yeung, H. Jin and M. Yang, "Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks," Int. Journal of Network Security, Vol.4, No.2, pp.227-234, 2007.
|
4 |
R. H. Khokhar, Md. A. Ngadi, S. Manda, "A Review of Current Routing Attacks in Mobile Ad Hoc Networks," International Journal of Computer Science and Security, Vol.2, No.3, pp.18-29, 2008.
|
5 |
A. Rajaram, S. Palaniswami, "The Trust-based MAC-Layer Sercurity Protocol for Mobile Ad hoc Networks," Int. Journal on Computer Science and Engineering, Vol.2, No.2, pp.400-408, 2010.
|
6 |
C.E Perkins, E. M Royer, "The Ad-hoc On-demand Distance Vector Protocol (AODV)," in Ad-hoc networking, Addison-Wesley, pp.173-219, 2001.
|
7 |
X.Jin, et al, "ZSBT: A novel algorithm for tracing DoS attackers in MANETs," EURASIP Journal on Wireless Communications and Networking, Vol.2006, pp.1-9, 2006.
|