1. Agarwal, K., & Wang, W. (2005). Statistical analysis of the impact of routing in MANETs base on real-time measurement. In Proceedings of IEEE ICCCN.
2. Cretu, F., Parekh, J., Wang, & Stolfo, J. (2006). Intrusion and anomaly detection model exchange for mobile ad-hoc networks. In Proceeding of IEEE consumer communication and networking conference 2006.
3. Hijazi, A., & Nasser, N. (2005). Using mobile agent for intrusion detection in wireless ad-hoc networks. In Proceeding of IEEE WCNC.
4. Hu, Y., Perrig, A., & Johnson, B. (2002). A secure on demand routing protocol for ad hoc networks. In Proceeding of MobiCom, Atlanta, Georgia, USA, September (pp. 23–28).
5. Hu, Y., Jhonson, B., & Perrig, A. (2003). SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1, 175–192.