P. Papadimitratos and Z. Haas, “Handbook of ad hoc wireless networks,” chapter Securing mobile ad hoc networks, CRC Press, 2002.
F. Adelstein, S. K. S. Gupta, and G. G. Richard III, “Funda-mentals of mobile and pervasive computing,” McGraw-Hill, 2005.
D. Djenouri, L. Khelladi, and A. N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Communications surveys & tutorials, 7(4): pp. 2-28, 2005.
M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM SIGMOBILE Mobile Computing and Communications Review, 6(3): pp. 106-107, 2002.
Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad hoc routing service in adversarial environments,” Wireless personal communications: an international journal, 29 (3-4): pp. 367-388, 2004.
K. Paul, R. R. Choudhuri, and S. Bandyopadhyay, “Survivability analysis of ad hoc wireless network architecture,” Proceedings of the IFIP-TC6/European Commission International Workshop on Mobile and Wireless Communication Networks, pp. 31-46, May 16-17, 2000.
J. Short, R. Bagrodia, and L. Kleinrock, “Mobile wireless network system simulation,” Wireless Network Journal, Vol. 1, No. 4, 1995.
R. J. Ellison, D. A. Fisher, and R. C. Linger, “An approach to survivable systems,” In: NATO IST Symposium on Protecting Information Systems in the 21st Century, 1999.
M. S. Deutsch and R. R.Willis, “Software quality engineering: A total technical and management approach,” IST Symposium on Protecting Information Systems in the 21st Century, 1999, Englewood Cliffs, NJ: Prentice- Hall, 1988.
B. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, “Survivable network systems: An emerging discipline,” Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997.
D. Moitrasoumyo and L. K. Suresh, “A simulation model of managing survivability of network of emergent Systems,” [J], TechniealRePort CMU/SEI-2000-TR-020, 2000.
K. J. Sanjay, M. W. Jeannette, and C. L. Richard, “Survivability Analysis of Network Spesifications,” In: Workshop on Depended ability Despite Malicious Fault, 2000 Intemational Conefreneeon Dependable Systemsand Networks (DSN2000); 2000, NewYork USA: IEEE ComPuterSoeiety: 2000, June 25-28, 2000.
R. W. Makr, “The quantitative impact of survivable network architectural on service availbaility,” [J], IEEE Communications Magazine, 36(5): pp. 71-77, 1998.
D. Y. Chen, S. Garg, and K. S. Trivedi, “Network survivability performance evaluation: A quantitative approach with applications in wireless ad-hoc networks,” Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, Atlanta, Georgia, USA, pp. 28-28, September 2002.
Dahlberg, T. S. Ramaswamy, and D. Tipper, “Issues in the survivability of wireless networks,” Proceedings IEEE Mobile and Wireless Communication Networks Workshop, May 1997.
B.Wu, J. M. Chen, and J. Wu, “A survey of attack and countermeasures in mobile ad hoc networks,” Wireless Network Security, Springer US, pp. 103-135, 2007.
G. F. Riley, “The georgia tech network simulator,” In Proceedings of the ACM SIGCOMM, New York, pp. 5-12, August 2003.