[1] Raja, M.L. and Baboo, C.D.S.S. (2014) An Overview of MANET: Applications, Attacks and Challenges.
[2] Chitkara, M. and Ahmad, M.W. (2014) Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocols. International Journal of Computer Science and Mobile Computing, 3, 432-437.
[3] Mohammad, S., Alsanabani, M. and Alahdal, T. (2014) Comparison Study of Routing Protocols in MANET. International Journal of Ad Hoc, Vehicular and Sensor Networks, 1, 1-9.
[4] Odeh, A., Abdel Fattah, E. and Alshowkan, M. (2012) Performance Evaluation of AODV and DSR Routing Protocols in MANET Networks.
[5] Verma, S. and Singh, P. (2014) Energy Efficient Routing in MANET: A Survey. International Journal of Engineering and Computer Science, 3, 3971-3977.
[6] Mamatha, G. and Sharma, D.S. (2010) Analyzing the MANET Variations, Challenges, Capacity and Protocol Issues. International Journal of Computer Science & Engineering Survey, 1, 14-21.
http://dx.doi.org/10.5121/ijcses.2010.1102
[7] Goyal, P., Parmar, V. and Rishi, R. (2011) Manet: Vulnerabilities, Challenges, Attacks, Application. International Journal of Computational Engineering & Management, 11, 32-37.
[8] Aftab, M.U., Nisar, A., Asif, D., Ashraf, A. and Gill, B. (2013) RBAC Architecture Design Issues in Institutions Collaborative Environment. International Journal of Computer Science Issues, 10, 216-221.
[9] Aftab, M.U., Habib, M.A., Mehmood, N., Aslam, M. and Irfan, M. (2015) Attributed Role Based Access Control Model. Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi, 18 December 2015, 83-89.
http://dx.doi.org/10.1109/CIACS.2015.7395571
[10] Chitkara, M. and Ahmad, M.W. (2014) Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocols. International Journal of Computer Science and Mobile Computing, 3, 432-437.