routıng securıty

ROUTING
1. B.A.T.M.A.N. (Better Approach to Mobile Ad-hoc Networking) (Arash Barzinmehr)
http://www.open-mesh.org/projects/open-mesh/wiki
2. TBRPF (Topology Broadcast based on Reverse-Path Forwarding) (Golnaz Arashfar)
http://web.archive.org/web/20120403000811/http://www.sri.com/esd/projects/tbrpf/
3. A Novel Encounter-based Metric for Mobile Ad Hoc Networks Routing, Ad Hoc Networks, 2013
(Ahmet Aktaş)
http://www.sciencedirect.com/science/article/pii/S1570870513002345
4. Hop Count Based Distance Estimation in Mobile Ad Hoc Networks: Challenges & Consequences, Ad
Hoc Networks, 2014 (Aziz Girgeç)
http://www.sciencedirect.com/science/article/pii/S1570870513001765
5. MQ-Routing, Mobility-, GPS- and Energy-aware Routing Protocol in MANETs, Ad Hoc Networks for
Disaster Relief Scenarios, Ad Hoc Networks, 2013 (Songül Tozan)
http://www.sciencedirect.com/science/article/pii/S1570870512001667
6. VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks, IEEE Transactions on
Vehicular Technology, 2008 (Çağatay Kömürcü)
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=04356982
7. Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks, InfoCom 2007 (Tohid T. Gogjeh)
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4215805
8. Converge and Diverge: A Geographic Routing for Delay/Disruption Tolerant Networks using a
Delegation Replication Approach, IEEE Transactions on Vehicular Technology, 2013 (Murat
Harmandalı)
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06409476
SECURITY
9. On the optimality of cooperative intrusion detection for resource constrained wireless networks,
Computers & Security, 2013 (Emine Coştu)
10. An intrusion detection & adaptive response mechanism for MANETs, Ad Hoc Networks, 2014 (Uğur
Mertoğlu)
11. A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad Hoc Network, Ad
Hoc Networks, 2010 (Tolga Tatlısu)
12. The Placement-Configuration Problem for Intrusion Detection Nodes in Wireless Sensor Networks,
Computers & Electrical Engineering, 2013 (Ahmet Nasir)
13. A Comparative Evaluation of Intrusion Detetion Architectures for Mobile Ad Hoc Networks,
Computers & Security, 2011 (Ömer Faruk)
14. Intrusion Detection in MANET using Classification Algorithms: The Effects of Cost and Model
Selection, Ad Hoc Networks, 2013 (Özlem Kahraman)
15. Trust Prediction and Trust-Based Source Routing in Mobile Ad hoc Networks, Ad Hoc Networks,
2013 Mehmet (Seçkin Çevik)
16. On the tradeoff between altruism and selfishness in MANET trust management, Ad Hoc Networks,
2013 (Bahri Gökcan)
17. EMLTrust: An enhanced Machine Learning based Reputation System for MANETs, Ad Hoc
Networks, 2012 (Emre Kurt)
18. Integrating Machine Learning in Ad Hoc Routing : A Wireless Adaptive Routing Protocol,
International Journal of Communication Systems, 2011 (Ahmet Kutluana)
http://onlinelibrary.wiley.com/doi/10.1002/dac.1202/full
19. Muton: Detecting Malicious Nodes in Disruption-Tolerant Networks, WCNC, 2010 (Fatih Güler)
20. Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording,
WoWMoM 2010. (Ferdi Yıldız)
21. Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks, AdhocNets 2013.
(Gonca Canan İçöz)
22. A Ferry-Based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks, 2007.
(Hüseyin Poyraz)
23. Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols,
IEEE Transactions on Vehicular Technology, 2013 (Kevser Karakurt)
24. Towards a Reputation-based Routing Protocol to Contrast Blackholes in a Delay Tolerant Network,
Ad Hoc Networks, 2012 (Yavuz Selim Özzengin)
25. Prospects and Problems of Wireless Communication for Underwater Sensor Networks, Wiley
Special Issue on Underwater Sensor Networks, 2008 (Fehime Can)
26. An Adaptive Approach for Information Dissemination in Vehicular Ad Hoc Networks, Journal of
Network and Computer Applications, 2011. (SeyedElyar Hashemsereht)
http://www.sciencedirect.com/science/article/pii/S1084804511001226
27. Strategies and Techniques for Node Placement in Wireless Sensor Networks : A Survey, Ad Hoc
Networks, 2008 (Torkan Givtaj)
http://www.sciencedirect.com/science/article/pii/S1570870507000984
28. Security on VANETs : Privacy, Misbehaving Nodes, False Information and Secure Data Aggregation,
Journal of Network and Computer Applications, 2011. (Fatih Sakız)
http://www.sciencedirect.com/science/article/pii/S1084804511001317
29. SVELTE: Real-time Intrusion Detection in the Internet of Things, Ad Hoc Networks, 2013 (Ömer
Mintemur)
30. Data Aggregation and Roadside Unit Placement for a VANET Traffic Information System, VANET
2008. (Abdullah Polat)
http://dl.acm.org/citation.cfm?id=1410054