C. S. R. Murthy and B. S. Manoj, “Ad-Hoc Wireless Networks Architectures and Protocols,” Prentice Hall Communications Engineering and Emerging Technologies Series, Pearson Education, Upper Saddle River, 2004.
 B. B. Gupta, R. C. Joshi and M. Misra, “Defending against Distributed Denial of Service Attacks: Issues and Challenges,” Information Security Journal: A Global Perspective, Vol. 18, No. 5, 2009, pp. 224-247.
 B. Han, H. H. Fu, L. Lin and W. Jia, “Efficient Construction of Connected Dominating Set in Wireless Ad Hoc Networks,” IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, Fort Lauderdale, 25-27 October 2004, pp. 570-572,
 A. Piskozub, “Denial of Service and Distributed Denial of Service Attacks,” Proceedings of the International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science, Lviv-Slavsko, 18-23 February 2002, pp. 303-304.
 S. M. Specht, “Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures,” ISCA 17th International Conference on Parallel and Distributed Computing Systems, San Francisco, 15-17 September 2004, pp. 543-550.
 Q. M. Li, “On the Effectiveness of DDoS Attacks on Statistical Filtering,” INFOCOM 2005, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, 13-17 March 2005, pp. 1373-1383.
 Y. H. Guo and M. Simon, “Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks,” Fourth International Conference on Network and System Security, Melbourne, 1-3 September 2010, pp. 128-135. doi:10.1109/NSS.2010.45
 E. Alomari, S. Manickam, B. B. Gupta, S. Karuppayah and R. Alfaris, “Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art,” International Journal of Computer Applications, Vol. 49, No. 7, 2012, pp. 24-32.
 B. B. Gupta, M. Misra and R. C. Joshi, “FVBA: A Combined Statistical Approach for Low Rate Degrading and High Bandwidth Disruptive DDoS Attacks Detection in ISP Domain,” Proceedings of 16th IEEE International Conference on Networks (ICON-2008), New Delhi, 12-14 December 2008, pp. 1-4. doi:10.1109/ICON.2008.4772654
 A. Srivastava, B. B. Gupta, A. Tyagi, A. Sharma and A. Mishra, “A Recent Survey on DDoS Attacks and Defense Mechanisms,” Proceedings of the First International Conference on Parallel, Distributed Computing Technologies and Applications (PDCTA-2011), Tirunelveli, 23-25 September 2011, pp. 570-580.
 B. B. Gupta, R. C. Joshi and M. Misra, “ANN Based Scheme to Predict Number of Zombies Involved in a DDoS Attack,” International Journal of Network Security (IJNS), Vol. 14, No. 1, 2012, pp. 36-45.
 R. Guo, G. R. Chang, R. D. Hou, Y. H. Qin, B. J. Sun, A. Liu, Y. Jia and D. Peng, “Research on Counter Bandwidth Depletion DDoS Attacks Based on Genetic Algorithm,” Third International Conference on Natural Computation, ICNC 2007, Haikou, 24-27 August 2007, pp. 155-159,.
 H.-J. Kim, R. B. Chitti and J. S. Song, “Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks,” Journal of Information Processing Systems, Vol. 7, No. 1, 2011, pp. 137-150.
 U. D. Khartad and R. K. Krishna, “Route Request Flooding Attack Using Trust Based Security Scheme in Manet,” International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN), Vol. 1, No. 4, 2012, p. 27.
 P. J. Criscuolo, “Distributed Denial of Service Trinoo, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht, CIAC-2319,” Department of Energy Computer Incident Advisory Capability (CIAC), UCRLID-136939, Rev.1, Lawrence Livermore National Laboratory, Livermore, 2000.
 A. Mishra, B. B. Gupta and R. C. Joshi, “A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques,” European Intelligence and Security Informatics Conference, EISIC 2011, 12-14 September 2011, pp. 286, 289.
 Y. Chaba, Y. Singh and P. Aneja, “Performance Analysis of Disable IP Broadcast Technique for Prevention of Flooding-Based DDoS Attack in MANET,” Journal of Networks, Vol. 4, No. 3, 2009, pp. 178-183.
 A. Nayyar “Enhanced Anomaly Detection IDS-Based Scheme for Dynamic MANET On-Demand (DYMO) Routing Protocol for MANETS,” International Journal of Computer Science and Mobile Computing, Vol. 2, No. 4, 2013, pp. 384-390.
 D. Johnson, D. Maltz and J. Broch, “DSR the Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks,” In: C. E. Perkins, Ed., Ad Hoc Networking, Addison-Wesley Longman Publishing Co., Inc., Boston, 2001, pp. 139-172.
 C. E. Perkins, E. M. Belding-Royer and S. R. Das, “Ad Hoc On-Demand Distance Vector (AODV) Routing,” 2nd IEEE Workshop on Workshop Mobile Computing Systems and Applications, New Orleans, 25-26 February 1999, pp. 90-100.
 S. Saraeian, F. Adibniya, M. G. Zadeh and S. A. Abtahi, “Performance Evaluation of AODV Protocol under DDoS Attacks in MANET,” World Academy of Science, Engineering and Technology, Vol. 45, 2008, p. 501.
 G. S. Tomar, T. Sharma, D. Bhattacharyya and T.-H. Kim, “Performance Comparision of AODV, DSR and DSDV under Various Network Conditions: A Survey,” 2011 International Conference on Ubiquitous Computing and Multimedia Applications, Daejeon, 13-15 April 2011, pp. 3-7.
 P. Ning and K. Sun, “How to Misuse AODV: A Case Study of Inside Attacks against Mobile Ad-Hoc Routing Protocols,” Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, New York, 18-20 June 2003, pp. 60-67.
 M. Y. Dangore and S. S. Sambare, “A Survey on Detection of Blackhole Attack Using AODV Protocol in MANET,” International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 1, No. 1, 2013, pp. 55-61.