1. Tang, J., Cheng, Y., & Zhuang, W. (2014). Real-time misbehavior detection in IEEE 802.11-based wireless networks: An analytical approach. IEEE Transactions on Mobile Computing,
13(1), 146–158.
2. Tcholtcheu, N., & Schieferdecker, I. (2014). Framework for distributed autonomic self-healing in fixed IPv6 networks. International Journal of Communication Systems,
27(12), 4103–4125.
3. Lu, S. et al. (2006). Robust rate adaptation for 802.11 wireless networks. In Proceedings of the 12th annual international conference on mobile computing and networking (pp. 146–157). Los Angeles, CA.
4. Vishnu Balan, E., Priyan, M. K., Gokulnath, C., & Usha Devi, G. (2015). Hybrid architecture with misuse and anomaly detection techniques for wireless networl. In: This full-text paper was peer-reviewed and accepted to be presented at the IEEE ICCSP 2015 conference.
5. Urdaneta, G., Pierre, G., & van Steen, M. (2011). A survey of DHT security techniques. ACM Computing Surveys,
43, 2.
https://doi.org/10.1145/1883612.1883615
.