1. The quest for security in mobile ad hoc networks;Hubaux,2001
2. Security for Wireless Ad hoc Networks;Anjum,2007
3. B. Awerbuch et al. On the survivability of routing protocols in ad hoc wireless networks, in: SecureComm 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005.
4. P. Brutch, C. Ko, Challenges in intrusion detection for wireless ad-hoc networks, in: 2003 Symposium on Applications and the Internet Workshops, Proceedings, 2003.
5. M. Hossain, S.M. Bridges, R.B. Vaughn Jr., Adaptive intrusion detection with data mining, in: IEEE International Conference on Systems, Man and Cybernetics, vol. 4, 2003, pp. 3097–3103.