[1] Z. J. Haas, J. Deng, B. Liang, P. Papadimitratos, and S. Sajama, “Wireless ad hoc networks,” Encycl. Telecommun., 2002.
[2] S. Yousefi, M. S. Mousavi, and M. Fathy, “Vehicular ad hoc networks (VANETs): challenges and perspectives,” in ITS Telecommunications Proceedings, 2006 6th International Conference on, 2006, pp. 761– 766.
[3] H. Deng, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks,” IEEE Commun. Mag., vol. 40, no. 10, pp. 70–75, 2002.
[4] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Comput. networks, vol. 47, no. 4, pp. 445–487, 2005.
[5] V. Balakrishnan and V. Varadharajan, “Packet drop attack: A serious threat to operational mobile ad hoc networks,” in Proceedings of the International Conference on Networks and Communication Systems (NCS 2005), Krabi, 2005, pp. 89–95.
[6] M. Peng, W. Shi, J.-P. Corriveau, R. Pazzi, and Y. Wang, “Black hole search in computer networks: State-of-the-art, challenges and future directions,” J. Parallel Distrib. Comput., vol. 88, pp. 1–15, 2016.
[7] J.-M. Chang, P.-C. Tsou, I. Woungang, H.-C. Chao, and C.-F. Lai, “Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach,” IEEE Syst. J., vol. 9, no. 1, pp. 65–75, 2015.
[8] A. Aijaz and A. H. Aghvami, “Cognitive Machine-to-Machine Communications for Internet-of-Things: A Protocol Stack Perspective,” IEEE Internet Things J., vol. 2, no. 2, pp. 103–112, 2015.
[9] Venkatesh K., Srinivas L.N.B., Mukesh Krishnan M.B., Shanthini A., “QoS improvisation of delay sensitive communication using SDN based multipath routing for medical applications,” FUTURE GENERATION COMPUTER SYSTEMS [INTERNATIONAL], Vol. 93, pp.256-265, 2019.
[10] X. Meng and T. Chen, “Event-driven communication for sampled-data control systems,” Am. Control Conf. (ACC), 2013, no. 1, pp. 3002– 3007, 2013.
[11] Vakaavinash Reddy., K Venkatesh, “Role of Software-Defined Network in Industry 4.0,” EAI/SPRINGER INNOVATIONS IN COMMUNICATION AND COMPUTING, Vol.1, , pp.197-218
[12] J.-H. Cho, R. Chen, and K. S. Chan, “Trust threshold based public key management in mobile ad hoc networks,” Ad Hoc Networks, vol. 44, pp. 58–75, 2016.
[13] J. Friginal, D. de Andrés, J.-C. Ruiz, and M. Martínez, “REFRAHN: a resilience evaluation framework for ad hoc routing protocols,” Comput. Networks, vol. 82, pp. 114–134, 2015.
[14] L. H. G. Ferraz, P. B. Velloso, and O. C. M. B. Duarte, “An accurate and precise malicious node exclusion mechanism for ad hoc networks,” Ad hoc networks, vol. 19, pp. 142–155, 2014.
[15] H. Xia, Z. Jia, X. Li, L. Ju, and E. H.-M. Sha, “Trust prediction and trust-based source routing in mobile ad hoc networks,” Ad Hoc Networks, vol. 11, no. 7, pp. 2096–2114, 2013.
[16] D. Cheelu, M. R. Babu, and P. Venkatakrishna, “A fuzzy-based intelligent vertical handoff decision strategy with maximised user satisfaction for next generation communication networks,” Int. J. Process Manag. Benchmarking, Dec. 2013.