AETiC 2019, Vol. 3 No. 2 40
[7] Shams, E. A. & Rizaner, A., “A novel support vector machine based intrusion detection system for mobile
ad hoc networks”, In Wireless Networks, 24(5), pp. 1821-1829, 2018.
[8] Belgaum, M. R.; Soomro, S.; Alansari, Z. & Alam, M., “Ideal node enquiry search algorithm (INESH) in
MANETS”, In Annals of Emerging Technologies in Computing(AETiC), Vol. 1, No. 1, pp. 26-33, 2017, DOI:
10.33166/AETiC.2017.01.004, Available: http://aetic.theiaer.org/archive/v1/v1n1/p4.html
.
[9] Liu, X.; Li, Z.; Yang, P. & Dong, Y., “Information-centric mobile ad hoc networks and content routing: a
survey”, In Ad Hoc Networks, no. 58, pp. 255-268, 2017.
[10] Govindasamy, J. & Punniakody, S., “A comparative study of reactive, proactive and hybrid routing
protocol in wireless sensor network under wormhole attack”, In Journal of Electrical Systems and
Information Technology. Vol 5, No. 3, pp. 735-744, 2017.
[11] Zhang, D. G.; Liu, S.; Liu, X. H.; Zhang, T. & Cui, Y. Y., “Novel dynamic source routing protocol (DSR)
based on genetic algorithm-bacterial foraging optimization (GA-BFO)”, In International Journal of
Communication Systems, 31(18), e3824, 2018.
[12] Taha, A.; Alsaqour, R.; Uddin, M.; Abdelhaq, M. & Saba, T., “Energy efficient multipath routing protocol
for mobile ad-hoc network using the fitness function”, In IEEE Access, 5, pp. 10369-10381, 2017.
[13] Menaka, R.; Ranganathan, V. & Sowmya, B., “Improving Performance Through Reputation Based Routing
Protocol for Manet”,Wireless Personal Communications, Vol. 94, No. 4, pp. 2275-2290, 2017.
[14] Belgaum, M. R.; Soomro, S.; Alansari, Z. & Alam, M., “Treatment of reactive routing protocols using
second chance based on malicious behavior of nodes in MANETS”, In Pakistan Journal of Engineering
Technology and Science, Vol. 6, No. 2, pp. 145-155, 2016.
[15] Singh, R. and Verma, A. K., “Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for
WSN”, In International Journal of Electronics and Communications, 72, pp. 166-173, 2016.
[16] Chaudhry, J.; Saleem, K.; Haskell-Dowland, P. and Miraz, M. H., "A Survey of Distributed Certificate
Authorities in MANETs”, In Annals of Emerging Technologies in Computing (AETiC), Vol. 2, No. 3, pp. 11-
18, 2018, DOI: 10.33166/AETiC.2018.03.002, Available: http://aetic.theiaer.org/archive/v2/v2n3/p2.html
.
© 2019 by the author(s). Published by Annals of Emerging Technologies in Computing
(AETiC), under the terms and conditions of the Creative Commons Attribution (CC BY)
license which can be accessed at http://creativecommons.org/licenses/by/4.0.
www.aetic.theiaer.org