3Zhou Lidong, Haas Z J. Securing Ad Hoc Networks[J]. IEEE Network, 1999, 13(6): 24-30.
4Zhang Yongguang, Lee Wenke. Intrusion Detection in Wireless Ad Hoc Networks[C]//Proc. of the ACM MOBICOM'00. Boston, MA, USA:[s. n.], 2000.
5Aad I, Hubaux J P, Knightly E W. Denial of Service Resilience in Ad Hoc Networks[C]//Proceedings of MOBICOM'04. Philadelphia, Pennsylvania, USA: [s. n.], 2004.
6Xu Kaixing, Hong Xiaoyan, Gerla M. Landmark Routing in Large Wireless Battlefield Networks Using UAVs[C]//Proceedings of MILCOM'01. Mclean, VA, USA: [s. n.], 2001.
7Baras J S. Modeling and Simulation of Telecommunication Networks for Control and Management[C]//Proc. of the 2003 Winter Simulation Conference. New Orleans, Louisiana, USA: [s. n.], 2003.
8AhleHagh H, Michalson W R. Statistical Characteristics of Wireless Network Traffic and Its Impact on Ad Hoc Network Performance[C}//Proceedings of the Advanced Simulation Technologies Conference. Orlando, USA: [s. n.], 2003.
9Cunningham W H. Optimal Attack and Reinforcement of a Network [J] .Journal of the ACM (JACM), 1985, 32(3): 549- 561.
10Kuang R B. Rule Based Security Checking[R]. Technical Report, MIT lab for Computer Science, 1994.