1 |
Misra, S., Krishna, P.V. and Abraham, K.I. "A stochastic learning automata-based solution for intrusion detection in vehicular ad-hoc networks," Security and Communication Networks, Vol. 4, No. 6, pp.666-677, 2011.
DOI
|
2 |
Jha, V., Khetarpal, K. and Sharma, M. "A survey of nature inspired routing algorithms for MANETs," Proceedings of the 3rd International Conference on Electronics Computer Technology, 8-10 April, Kanyakumari, India, pp.16-24, 2011.
|
3 |
Chen, Y. R., L. Yu, Q. F. Dong, Z. Hong. "Power Control in Wireless Sensor Network Based on Nearest Neighbor Algorithm," J. Zhejiang Univ. Eng Sci., Vol. 44, pp. 1321-1326, 2010.
|
4 |
Abusalah, L., Khokhar, A., & Guizani, M. "A survey of secure mobile ad hoc routing protocols," IEEE Communications Surveys & Tutorial, 10(4), pp. 78-93, 2008.
DOI
|
5 |
Goyal, T., Batra, S., & Singh, A. "A literature review of security attack in mobile ad-hoc networks," International Journal of Computer Applications, 9(12), pp. 11-15, 2010.
DOI
|
6 |
Zapata, M. G. & Asokan, N. "Secure ad hoc on-demand distance vector (SAODV) routing," ACM Mobile Computing and Communications Review, 3(6), pp. 106-107, 2002.
|
7 |
Taneja S., & Kush, A. "A survey of routing protocols in mobile ad hoc network," International Journal of Innovation, Management and Technology, 1(3), pp. 279-285, 2010.
|
8 |
Tomar, P., Suri, P. K., & Soni, M. K. "A comparative study for secure routing in MANET," International Journal of Computer Applications, 4(5), pp. 17-22, 2010.
DOI
|