Oyedare, T., Al Sharah, T. and Shetty, S. (2016) A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs. International Conference on Wired/Wireless Internet Communications (WWIC), Thessaloniki, 25-27 May 2016.
 Chen, M.-H., Lin, M.-H., Hong, Y.-W.P. and Zhou, X. (2013) On Cooperative and Malicious Behaviors in Multirelay Fading Channels. IEEE Transactions on Information Forensics and Security, 8, 1126-1139.
 Long, H., Wei, X.G., Zhang, X., Wang, J. and Wang, W. (2014) Cooperative Jamming and Power Allocation in Three-Phase Two-Way Relaying System with Untrusty Relay Node. 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), Beijing, 16-23 August 2014, 14.
 Dong, L., Zadeh, H.Y. and Jafarkhani, H. (2011) Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper. 2011 IEEE International Conference on Communications (ICC), Kyoto, 5-9 June 2011, 15.
 Yang, J., Kim, I.-M. and Kim, I.-M. (2013) Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers. IEEE Transactions on Wireless Communications, 12, 2840-2852.
 Zhang, Q., Huang, X., Li, Q. and Qin, J. (2015) Cooperative Jamming Aided Robust Secure Transmission for Wireless Information and Power Transfer in Miso Channels. IEEE Transactions on Communications, 63, 906-915.
 Yang, J., Kim, I.-M. and Kim, D.I. (2014) Joint Design of Optimal Cooperative Jamming and Power Allocation for Linear Precoding. IEEE Transactions on Communications, 62, 3285-3298.
 Stanojev, I. and Yener, A. (2011) Recruiting Multi-Antenna Transmitters as Cooperative Jammers: An Auction-Theoretic Approach. 2011 49th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, 28-30 September 2011, 1106-1112.
 Gong, T. and Bhargava, B. (2013) Immunizing Mobile ad Hoc Networks against Collaborative Attacks Using Cooperative Immune Model. Security and Communication Networks, 6, 58-68. http://dx.doi.org/10.1002/sec.530
 Wang, W., Bhattacharjee, S., Chatterjee, M. and Kwiat, K. (2013) Collaborative Jamming and Collaborative Defense in Cognitive Radio Networks. Pervasive and Mobile Computing, 9, 572-587.
 Viet, K., Panda, B. and Hu, Y. (2012) Detecting Collaborative Insider Attacks in Information Systems. 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, 14-17 October 2012, 502-507.
 Al Sharah, A. and Shetty, S. (2015) Accumulative Feedback Adaptation Transmission Rate in Mobile Ad-Hoc Networks. 2015 International Conference and Workshop on Computing and Communication (IEMCON), 15-17 October 2015, Vancouver, 15.