1. Wu, L., Yu, R.: A Threshold-based method for selfish nodes detection in MANET. In: Computer Symposium (ICS), pp. 875–882 (2010)
2. Buttyn, L., Hubaux, J. P.: Enforcing service availability in mobile Ad-Hoc WANs. In: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 87–96 (2000)
3. Lal, C., Petroccia, R., Pelekanakis, K., Conti, M., Alves, J.: Toward the development of secure underwater acoustic networks. IEEE J. Ocean. Eng. 42(4), 1075–1087 (2017)
4. Khan, S., Prasad, R., Saurabh, P., Verma, B.: Weight-Based Secure Approach for Identifying Selfishness Behavior of Node in MANET. In: Satapathy S., Tavares J., Bhateja V., Mohanty J. (eds.) Information and Decision Sciences. Advances in Intelligent Systems and Computing, vol. 701, pp 387–397 (2018)
5. Bisen, D., Sharma, S.: Fuzzy based detection of malicious activity for security assessment of MANET, Natl. Acad. Sci. Lett., 23–28 (2017)