[1] Oyedare, T., Al Sharah, T. and Shetty, S. (2016) A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs. International Conference on Wired/Wireless Internet Communications (WWIC), Thessaloniki, 25-27 May 2016.
[2] Chen, M.-H., Lin, M.-H., Hong, Y.-W.P. and Zhou, X. (2013) On Cooperative and Malicious Behaviors in Multirelay Fading Channels. IEEE Transactions on Information Forensics and Security, 8, 1126-1139.
http://dx.doi.org/10.1109/TIFS.2013.2262941
[3] Long, H., Wei, X.G., Zhang, X., Wang, J. and Wang, W. (2014) Cooperative Jamming and Power Allocation in Three-Phase Two-Way Relaying System with Untrusty Relay Node. 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), Beijing, 16-23 August 2014, 14.
[4] Dong, L., Zadeh, H.Y. and Jafarkhani, H. (2011) Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper. 2011 IEEE International Conference on Communications (ICC), Kyoto, 5-9 June 2011, 15.
[5] Yang, J., Kim, I.-M. and Kim, I.-M. (2013) Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers. IEEE Transactions on Wireless Communications, 12, 2840-2852.
http://dx.doi.org/10.1109/TWC.2013.040413.120972
[6] Zhang, Q., Huang, X., Li, Q. and Qin, J. (2015) Cooperative Jamming Aided Robust Secure Transmission for Wireless Information and Power Transfer in Miso Channels. IEEE Transactions on Communications, 63, 906-915.
http://dx.doi.org/10.1109/TCOMM.2015.2405063
[7] Yang, J., Kim, I.-M. and Kim, D.I. (2014) Joint Design of Optimal Cooperative Jamming and Power Allocation for Linear Precoding. IEEE Transactions on Communications, 62, 3285-3298.
http://dx.doi.org/10.1109/TCOMM.2014.2345659
[8] Gagandeep, A. and Kumar, P. (2012) Analysis of Different Security Attacks in MANETs on Protocol Stack: A Review, International Journal of Engineering and Advanced Technology (IJEAT), 1, 22-49.
[9] Stanojev, I. and Yener, A. (2011) Recruiting Multi-Antenna Transmitters as Cooperative Jammers: An Auction-Theoretic Approach. 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, 28-30 September 2011, 1106-1112.
[10] Gong, T. and Bhargava, B. (2013) Immunizing Mobile ad Hoc Networks against Collaborative Attacks Using Cooperative Immune Model. Security and Communication Networks, 6, 58-68. http://dx.doi.org/10.1002/sec.530
[11] Wang, W., Bhattacharjee, S., Chatterjee, M. and Kwiat, K. (2013) Collaborative Jamming and Collaborative Defense in Cognitive Radio Networks. Pervasive and Mobile Computing, 9, 572-587.
http://dx.doi.org/10.1016/j.pmcj.2012.06.008
[12] Viet, K., Panda, B. and Hu, Y. (2012) Detecting Collaborative Insider Attacks in Information Systems. 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, 14-17 October 2012, 502-507.
[13] Al Sharah, A. and Shetty, S. (2015) Accumulative Feedback Adaptation Transmission Rate in Mobile Ad-Hoc Networks. 2015 International Conference and Workshop on Computing and Communication (IEMCON), 15-17 October 2015, Vancouver, 15.