1. Minin, A. and Kalinin, M., Information security in computer networks with dynamic topology. Proceedings of the 8th International Conference on Security of Information and Networks, ACM New York, NY, USA, 2015, pp. 127–130.
2. Marti, S., Giuli, T.J., Baker, M.K., and Lai, K., Mitigating routing misbehavior in mobile ad hoc networks. In Proc. of the 6th Annual ACM/IEEE Intl. Conf. on Mobile Computing and Networking, 2000, p. 255–265.
3. Buchegger, S. and Boudec, J., Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes-Fairness In Dynamic Ad-hoc NetTworks), Proc. of the 3d ACM Intl. Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), 2002, pp. 226–336.
4. Zhang, Z., Naït-Abdesselam, F., Ho, P., and Lin X., RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks, IEEE Wireless Communications & Networking Conference, 2008, pp. 2621–2626.
5. Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. Proceedings of the 9th Intl. Conf. on Security of Information and Networks (SIN). ACM New York, NY, USA, 2016, pp. 81–87.