1. An optimal strategy to countermeasure the impersonation attack in wireless mesh network;Rajendran;Int. J. Inf. Technol.,2021
2. Strong security scheme for single node and colluding nodes byzantine Attacks in MANETS;Sivakami;Ann. Romanian Society for Cell Biol.,2021
3. A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks;Sittig;Appl. Clinical Informatics,2016
4. Securing vehicular ad hoc networks;Raya;J. Computer Security,2007
5. Ariadne: a secure on-demand routing protocol for ad hoc networks;Hu;Wireless networks,2005