Laxmi et al., 2013
| Publication | Publication Date | Title |
|---|---|---|
| Yi et al. | Resisting flooding attacks in ad hoc networks | |
| Yi et al. | A new routing attack in mobile ad hoc networks | |
| Brown et al. | Jamming and sensing of encrypted wireless ad hoc networks | |
| Aad et al. | Impact of denial of service attacks on ad hoc networks | |
| Laxmi et al. | JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET | |
| Venkatraman et al. | Strategies for enhancing routing security in protocols for mobile ad hoc networks | |
| Geetha et al. | SYN flooding attack—Identification and analysis | |
| Sreenath et al. | Countermeasures against multicast attacks on enhanced-on demand multicast routing protocol in MANETs | |
| Laxmi et al. | Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks | |
| Sen et al. | Secure routing in wireless mesh networks | |
| Wazid et al. | E-TCP for efficient performance of MANET under JF delay variance attack | |
| Eu et al. | Mitigating route request flooding attacks in mobile ad hoc networks | |
| Kolade et al. | Performance analysis of black hole attack in MANET | |
| Dhanalakshmi et al. | A reliable and secure framework for detection and isolation of malicious nodes in MANET | |
| Sachdeva et al. | Detection and analysis of Jellyfish attack in MANETs | |
| Taranum et al. | Detection and prevention of blackhole node | |
| Sandhu et al. | Impact of blackhole attack in MANET | |
| Gupta et al. | Stealthy off-target coupled-control-plane jamming | |
| Somasundaram et al. | A Multipath Reliable Routing for detection and isolation of malicious nodes in MANET | |
| Sharma et al. | Non-cryptographic detection approach and countermeasure for JFDV Attack | |
| Singh et al. | Flood Tolerant AODV Protocol (FT-AODV) | |
| Ghosh et al. | P-TCP: A prediction-based secure transmission control protocol for wireless ad hoc networks | |
| Omer | Impact of Jellyfish attack on routing protocols in TCP-based MANETs | |
| Mesleh | Black hole attack evaluation for AODV and AOMDV routing protocols | |
| Rathod et al. | Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks. |