1. Amiria, E., Keshavarz, H., Heidari, H., Mohamadi, E., Moradzadeh, H.: Intrusion detection systems in MANET: a review. In: ICIMTR International Conference on Innovation, Management and Technology Research, Malaysia, 22–23 September 2013 (2013)
2. Laqtib, S., El Yassini, K., Houmer, M., El Ouadghiri, M.D., Hasnaoui, M.L.: Impact of mobility models on optimized link state routing protocol in MANET. In: Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), 26–29 October 2016 (2016)
3. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the ACM Workshop on Wireless Security, pp. 21–30 (2002)
4. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. Department of Computer Science and Engineering Florida Atlantic University, Wireless/Mobile Network Security (2007)
5. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)