1. Surveying security analysis techniques in MANET routing protocols;Andel;IEEE Commun Surv Tut,2007
2. A black hole attack model using topology approximation for reactive ad-hoc routing protocols;Badenhop;Int J Secur Netw,2014
3. Carols of the Z-Wave security layer; or, robbing keys from Peter to unlock Paul;Badenhop;Int J PoC,2016
4. Evaluating ITU-T G.9959: wireless systems in the critical infrastructure;Badenhop,2015
5. An analytical black hole attack model using a stochastic topology approximation technique for reactive ad-hoc routing protocols;Badenhop;Int J Netw Secur,2016