[[1] S. Akram, I. Zubair and M. Islam, ”Fully distributed dynami- cally configurable firewall to resist DOS attacks MANET”, rev. Networked Digital Technologies, 2009, NDT ’09.First International Conference, Ostrava, 2009.10.1109/NDT.2009.5272096]Search in Google Scholar
[[2] M. K.A. D. ??? Alicherry, ”Distributed Policy Enforcement Ar- chitecture for MANETs”, Diploma work ???.]Search in Google Scholar
[[3] M. Alicherry, A. Keromytis and A. Stavrou, ”Evaluating a col- laborative defense architecture for MANETs”, Rev. Internet Multimedia Services Architecture and Applications (IMSAA), 2009, IEEE International Conference, Bangalore, 2009.10.1109/IMSAA.2009.5439498]Search in Google Scholar
[[4] R. Boppana and X. Su, ”On the Effectiveness of Monitoring for Intrusion Detection Mobile Ad Hoc Networks”, 2011.10.1109/TMC.2010.210]Search in Google Scholar
[[5] A. Boukerche, K. El-Khatib, L. Xu and L. Korba, ”SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks”, 2004.10.1016/j.comcom.2004.07.019]Search in Google Scholar
[[6] A. Chaudhary, V. Tiwari and A. Kumar, ”Design an anomaly based fuzzy intrusion detection system for packet dropping at- tack mobile ad hoc networks”, Gurgaon, 2014.10.1109/IAdCC.2014.6779330]Search in Google Scholar
[[7] D. Ismail and M. Jaafar, ”Mobile ad hoc network overview”, Melaka, 2007.10.1109/APACE.2007.4603864]Search in Google Scholar
[[8] L. Jin, Z. Zhang, D. Lai and H. Zhou, ”Implementing and Eval- uating An Adaptive Secure Routing Protocol for Mobile Ad Hoc Network”, Pomana, CA, 2006.10.1109/WTS.2006.334533]Search in Google Scholar
[[9] I. Khalil, S. Bataineh, L. Qubajah and A. Khreishah, ”Dis- tributed secure routing protocol for Mobile Ad-Hoc Networks”, Amman, 2013.10.1109/CSIT.2013.6588766]Search in Google Scholar
[[10] N. Noureldien, ”A novel taxonomy of MANET attacks”, Mar- rakech, 2015.10.1109/EITech.2015.7162947]Search in Google Scholar
[[11] L. Rajeswari, R. Annie and A. Kannan, ”Enhanced intrusion detection techniques for mobile ad hoc networks”, Tamil Nadu, 2007.10.1049/ic:20070757]Search in Google Scholar
[[12] S. Saha, R. Chaki and N. Chaki, ”A New Reactive Secure Rout- ing Protocol for Mobile Ad-Hoc Networks”, Ostrava, 2008.10.1109/CISIM.2008.13]Search in Google Scholar
[[13] B. Sun, L. Osborne, Y. Xiao and S. Guizani, ”Intrusion detection techniques mobile ad hoc and wireless sensor networks”,.]Search in Google Scholar
[[14] S. Uyyala and D. Naik, ”Anomaly based intrusion detection of packet dropping attacks mobile ad-hoc networks”, Kanyaku- mari, 2014.10.1109/ICCICCT.2014.6993132]Search in Google Scholar
[[15] B. Vaidya, D. Makrakis and H. Mouftah, ”Provisioning secure on-demand routing protocol mobile ad hoc network”, Kath- mandu, 2011.10.1109/AHICI.2011.6113952]Search in Google Scholar
[[16] P. Vilhan and L. Hudec, ”Building Public Key Infrastructure for MANET with Help of BATMAN Advanced”, Rev. Modelling Symposium (EMS), 2013 European, Manchester, 2013.10.1109/EMS.2013.94]Search in Google Scholar
[[17] N. V. Vinh, H. Jun and M.-K. Kim, ”A Self-secure Routing Protocol for Large Mobile Ad hoc Networks”, Singapore, 2007.10.1109/WOCN.2007.4284230]Search in Google Scholar
[[18] H. Zhao and S. Bellovin, ”High Performance Firewalls MAN-ETs”, Rev. Mobile Ad-hoc and Sensor Networks (MSN), 2010 Sixth International Conference, Hangzhou, 2010.]Search in Google Scholar
[[19] L. Zhitang and S. Shudong, ”A Secure Routing Protocol for Mobile Ad hoc Networks”, Melbourne, Qld., 2007.10.1109/ICIS.2007.43]Search in Google Scholar
[[20] D. Watkins and C. Scott, ”Methodology for evaluating the effec- tiveness of intrusion detection tactical mobile ad-hoc networks”, 2004.]Search in Google Scholar
[[21] J. Filipek and L.Hudec ”Distributed firewall using PKI mo- bile Ad Hoc networks”, Proceedings of the 16-th International Conference on Computer Systems and Technologies, CompSys-Tech’15.]Search in Google Scholar