1. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Sixth Annual International Conference on Mobile Computing and Networking (2000)
2. Deng, J., Balakrishnan, K., Varshney, P.K.: TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. In: IEEE Wireless Comm. and Networking Conf. (2005)
3. Chen, N., Nasser.: Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad-hoc Networks. In: IEEE International Conference on Communication (2007)
4. Roubaiey, A.l., Shakshuki, E., Sheltami, T., Mahmoud, A., Mouftah, H.: AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. In: IEEE International Conference on Advanced Information Networking and Applications (2010)
5. Abusalah, L., Guizani, M., Khokhar, A.: A Survey of Secure Mobile Ad Hoc Routing Protocols. IEEE Communications Surveys and Tutorials 10(4) (2008)