1. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems;Su;Computer Communications,Jan 2011
2. Secure reporting of traffic forwarding activity in mobile ad hoc networks;Choi,2005
3. T. A. Amornkul, “On detection mechanisms and their performance for packet dropping attack in ad hoc networks,” Ph. D Thesis, University of Pittsburgh, 2008.
4. A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networksmobile ad hoc networks;Zhanga;Procedia Computer Science,2019
5. A Reputation-based model for trust evaluation in social cyber-physical systems;Asai;IEEE International Workshop on Pervasive Flow of Things,2019