[1] MamataRath,BidudhenduPati, March 2016.- Energy efficient MANET Protocol using Cross Layer Design for Military Applications -, 66 146 -150
[2] K.Sanzgiri,B.Dahill,B. N.Levine,C.Shields,E. M.Belding-Royer, 2002.“A Secure Routing Protocol for Ad Hoc Networks,” the 10th IEEE International Conference on Network Protocols (ICNP, 12 -15
[3] Y.-C.Hu,A.Perrig,D. B.Johnson, September 2003.Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, -
[4] I.Aad,J.P.Hubaux,E.W.Knightly, 2008.Impact of Denial of Service Attacks on Ad Hoc Networks,”,IEEE/ACM Transactions on Networking (TON) 16 791 -802
[5] A.Nadeem,M.Howarth, 2009."Adaptive Intrusion Detection & Prevention of Denial of Service Attacks in MANETs,",International Conference on Communications and Mobile Computing -
[6] W.Ren,H.Jin,M.Yang,Mar, 2007.Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks,International Journal of Network Security 4 -
[7] M.Alicherry,A. D.Keromytis,A.Stavrou, December 2009."Evaluating a Collaborative Defense Architecture for MANETs,",IEEE Workshop on Collaborative Security Technologies (CoSec) -
[8] M.Carvalho, ."Security in Mobile Ad Hoc Networks,",IEEE Security & Privacy -
[9] C.Perkins,E.Belding-Royer,S.Das,“Ad Hoc OnDemand Distance Vector (AODV) Routing, July 2003., -
[10] D.Johnson,Y.Hu,D.Maltz,Feb, 2007., -
[11] V.Park,S.Corson, .Temporally-Ordered Routing Algorithm (TORA),” draft-ietf-manet-tora-spec-00, -
[12] MadhanMohan , R.,Selvakumar, 2012.Power controlled routing in wireless ad hoc networks using cross layer approach, 05 95 -101
[13] Ahmed , A.,Kumaran , T. Senthil S.; Syed, Abdul,Syed & S ubburam, S, 2014.Cross-layer design approach for power control in mobile adhoc networks,Egyptian Info. J. 11 1 -7
[14] Rath , M.,Pattanayak , B.K, 2014.- A methodical survey on real time applications in MANETS: Focussing on key issues,In International Conference on High Performance Computing and Applications (ICHPCA) 10 1 -5
[15] Pattanayak , B.K.,Rath, 2014.- A mobile agent based intrusion detection system architecture for mobile adhoc networks,J. Comput. Sci. 970 970 -975
[16] T.Clausen,P.Jacquet, 2003.Optimized Link State Routing Protocol (OLSR),” RFC3626, -
[17] R.Ogier,F.Templin,M.Lewis,Feb, 2004.Topology Dissemination Based on Reverse-Path Forwarding (TBRPF),” RFC3684, -
[18] C. E.Perkins,P.Bhagwat,Issue4,Oct, 1994.Highly Dynamic DestinationSequenced Distance-Vector Routing (DSDV) for Mobile Computers,” ACM SIGCOMM Computer Communication Review, 24 -
[19] S.Murthy,J. J.Garcia-, February 2003.An efficient routing protocol for wireless networks,” Network and Distributed System Security Symposium, -
[20] P.Gupta,P. R.Kumar, 1997.A system and Traffic Dependent Adaptive Routing Algorithm for Ad Hoc Networks,” the 36th IEEE Conference on Decision and Control, 10 -12
[21] Y.Liu,L.Shen, 2007.Defense of DoS Attack Focusing on Protecting Resource in Mobile Ad Hoc Networks,Computer Knowledge and Technology 2007 3 -
[22] Issue3,July-, 2017.jhum swain, binod kumar pattanayak and bibudhendu pati, “Mitigating the DdoS attacks using PDDoS efficient networking protocol in MANET for Military applications, 5 -
[23] MamataRath,BibudhenduPati, March 2016.- Energy efficient MANET Protocol Using Cross Layer Design for Military Applications -, 66 146 -150
[24] R.Kavitha,April, 2017.Advanced Random Time Queue Blocking with Traffic Prediction for Defense of Low-rate Dos attacks against Application Servers”,IJCNIS 9 -
[25] MoussaAli cherif,April, 2016.An EnergyConserving Predictive Preemptive Multipath Routing Protocol for Adhoc Networks: A Lifetime Improvement',IJCNIS 8 -
[26] BhavinJoshi, 2016.Mitigating dynamic Dos attacks in mobile ad hoc network”, Colossal Data Analysis and Networking (CDAN), Symposium on, 18 -
[27] ParveenKakkar, 2016.Performance investigations of reactive routing protocols under flooding attack in MANET, Computing for Sustainable Global Development (INDIAcom, 16 -