[1]
|
P. Papadimitratos and Z. Haas, “Handbook of ad hoc wireless networks,” chapter Securing mobile ad hoc networks, CRC Press, 2002.
|
[2]
|
F. Adelstein, S. K. S. Gupta, and G. G. Richard III, “Funda-mentals of mobile and pervasive computing,” McGraw-Hill, 2005.
|
[3]
|
D. Djenouri, L. Khelladi, and A. N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Communications surveys & tutorials, 7(4): pp. 2-28, 2005.
|
[4]
|
M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM SIGMOBILE Mobile Computing and Communications Review, 6(3): pp. 106-107, 2002.
|
[5]
|
Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad hoc routing service in adversarial environments,” Wireless personal communications: an international journal, 29 (3-4): pp. 367-388, 2004.
|
[6]
|
K. Paul, R. R. Choudhuri, and S. Bandyopadhyay, “Survivability analysis of ad hoc wireless network architecture,” Proceedings of the IFIP-TC6/European Commission International Workshop on Mobile and Wireless Communication Networks, pp. 31-46, May 16-17, 2000.
|
[7]
|
J. Short, R. Bagrodia, and L. Kleinrock, “Mobile wireless network system simulation,” Wireless Network Journal, Vol. 1, No. 4, 1995.
|
[8]
|
R. J. Ellison, D. A. Fisher, and R. C. Linger, “An approach to survivable systems,” In: NATO IST Symposium on Protecting Information Systems in the 21st Century, 1999.
|
[9]
|
M. S. Deutsch and R. R.Willis, “Software quality engineering: A total technical and management approach,” IST Symposium on Protecting Information Systems in the 21st Century, 1999, Englewood Cliffs, NJ: Prentice- Hall, 1988.
|
[10]
|
B. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, “Survivable network systems: An emerging discipline,” Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997.
|
[11]
|
D. Moitrasoumyo and L. K. Suresh, “A simulation model of managing survivability of network of emergent Systems,” [J], TechniealRePort CMU/SEI-2000-TR-020, 2000.
|
[12]
|
K. J. Sanjay, M. W. Jeannette, and C. L. Richard, “Survivability Analysis of Network Spesifications,” In: Workshop on Depended ability Despite Malicious Fault, 2000 Intemational Conefreneeon Dependable Systemsand Networks (DSN2000); 2000, NewYork USA: IEEE ComPuterSoeiety: 2000, June 25-28, 2000.
|
[13]
|
R. W. Makr, “The quantitative impact of survivable network architectural on service availbaility,” [J], IEEE Communications Magazine, 36(5): pp. 71-77, 1998.
|
[14]
|
D. Y. Chen, S. Garg, and K. S. Trivedi, “Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks,” Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, Atlanta, Georgia, USA, pp. 28-28, September 2002.
|
[15]
|
Dahlberg, T. S. Ramaswamy, and D. Tipper, “Issues in the survivability of wireless networks,” Proceedings IEEE Mobile and Wireless Communication Networks Workshop, May 1997.
|
[16]
|
B.Wu, J. M. Chen, and J. Wu, “A survey of attack and countermeasures in mobile ad hoc networks,” Wireless Network Security, Springer US, pp. 103-135, 2007.
|
[17]
|
G. F. Riley, “The georgia tech network simulator,” In Proceedings of the ACM SIGCOMM, New York, pp. 5-12, August 2003.
|