1. Abdul-Rahman A, Hailes S. Using recommendations for managing trust in distributed systems. In: Proceedings of IEEE Malaysia international conference on communication; 1997.
2. Adams WJ, Davis NJ. Toward a Decentralized Trust-based access control system for dynamic collaboration. In: Proceedings of sixth annual IEEE SMC information assurance workshop; 2005. p. 317–24.
3. Ahmed E, Samad K, Mahmood W. Cluster-based intrusion detection (CBID) architecture for mobile ad hoc networks. In: Proceedings of the AusCERT Asia pacific information technology security conference; 2006.
4. Albers P, Camp O, Percher J-M, Jouga B., Mé L., Puttini R. Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In: Proceedings of first international workshop on wireless information systems; 2002, p. 1–12.
5. Balakirishnan V, Varadharajan V. Designing secure wireless mobile ad hoc networks. In: Proceedings of 19th international conference advanced information networking and applications, vol. 2; 2005. p. 5–8.