1. Othman, S.M., Alsohybe, N.T., Ba-Alwi, F.M., Zahary, A.T.: Survey on intrusion detection system types. Int. J. Cyber Secur. Digit. Forensics 7, 444–463 (2018)
2. Zarpelão, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25–37 (2017)
3. Fragkiadakis, A.G., Siris, V.A., Petroulakis, N.E., Traganitis, A.P.: Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection. Wiley Online Library, February 2013. wileyonlinelibrary.com, https://doi.org/10.1002/wcm.2341
4. Yan, S., Chung, Y.: Improved ad hoc on-demand distance vector routing (AODV) protocol based on blockchain node detection in ad hoc networks. Int. J. Internet Broadcast. Commun. 12(3), 46–55 (2020)
5. Patel, A., Jain, A.: A study of various Black Hole Attack techniques and IDS in MANET. Int. J. Adv. Comput. Technol. 4(3), 58–62 (2015)