[1] S. J. Al-Shakarchi and R. Alubady, A Survey of Sel sh Nodes Detection in MANET: Solutions and Opportunities of Research, Proceedings of the 1st IEEE Babylon International Conference on Information Technology and Science (BICITS)(2021),178-184.
[2] M. M. Musthafa, K. Vanitha, A.M.J.MD. Zubair Rahman, K. Anitha,An Ecient Approach to Identify Sel sh Node in MANET, Proceedings of the International Conference on Computer Communication and Informatics (ICCCI)(2020).
[3] D. Das, K. Majumder, A. Dasgupta, Sel sh Node Detection and Low-Cost Data Transmission in MANET using Game Theory, Procedia Computer Science vol.54 (2015) 92-101.
[4] T. Fahad, R. Askwith, A Node Misbehavior Detection Mechanism for Mobile Ad-hoc Networks, (2006).
[5] K. Santhi, B. Parvathavarthini, Performance analysis of randomized rever ad hoc on-demand distance vector routing protocol in MANET, Journal of Computer Science vol .10, no. 11 (2014) 1850-1858.
[6] G. Ghalavand, A. Dana, A. Ghalavand and M. Rezahosieni, Reliable routing algorithm based on fuzzy logic for Mobile Adhoc Network, Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering(2010), V5-606-V5-609.
[7] M. Vanday. Baseri, H. Fatemidokht, Survey of di erent techniques for detecting sel sh nodes in MANETs, Journal of Mahani Mathematical Research Center (JMMRC) vol.11, no. 2 (2022) 45-59.
[8] A. Babakhouya, Y. Challal, and A. Bouabdallah, A Simulation Analysis of Routing Misbehavior in Mobile Ad Hoc Networks, Proceedings of the Second International Conference on Next Generation Mobile Applications, Services, and Technologies (2008),592-597.
[9] T. Fahad, D. Djenouri and R. Askwith, On detecting packets droppers in MANET: A novel low-cost approach, Proceedings of the Third International Symposium on Information Assurance and Security (2007), 56-64.
[10] D. Djenouri, N. Badache, Two Hops ack, New approach for sel sh nodes detection in mobile ad hoc networks, Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, (2005), 288-294.
[11] W. Yu, K. J. Ray Liu, Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring, a game-theoretic approach, IEEE transactions on information forensics and security vol. 3, no. 2 (2008) 317-330.
[12] H. J. Kim, J. M. Peha, Detecting sel sh behavior in a cooperative commons, Proceedings of the 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks,(2008), 1-12.
[13] C. E. Perkins and E. M. Royer, Ad-hoc on-demand distance vector routing, Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications, (1999),90-100.
[14] A. N. Thakare, M.Y. Joshi, Performance analysis of AODV & DSR routing protocol in mobile ad hoc networks, IJCA Special Issue on Mobile Ad-hoc Networks (2010) 211-218.
[15] L. Buttyan and J.-P. Hubaux, Stimulating cooperation in self-organizing in mobile ad hoc networks, Mobile Networks and Applications vol. 8 (2003) 579-592.
[16] Y. Wang, M. Singhal, On improving the eciency of truthful routing in MANETs with sel sh nodes, Pervasive and Mobile Computing (2007) 537-559.
[17] P. Michiardi and R. Molva, Core, A Collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Proceedings of the Communication and Multimedia Security Conference (2002), 107-121.
[18] T. Anantvalee and J. Wu, Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks, Proceedings of the IEEE International Conference on Communications, (2007), 3383-3388.
[19] E. H.Orallo, M. D. Serrat, J.C. Cano, C. T. Calafate, and P. Manzoni, Improving sel sh node detection in MANETs using a collaborative watchdog, IEEE Communications Lettersvol. 16, no. 5 (2012) 642-645.
[20] R. Vijian, V. Mareeswari, and K.Ramakrishna, Energy-based trust solution for detecting sel sh nodes in MANET using fozzy logic, International Journal of Research and Reviews in Computer Science(IJRRCS) vol. 2, no. 3 (2011) 647-652.
[21] K. Rama Abirami and M. G. Sumithra, Evaluation of neighbor credit value-based AODV routing algorithms for sel sh node behavior detection, Cluster Computing vol. 22 (2018) 1{10.
[22] R. Mangayarkarasi and R. Manikandan, Cost e ective collaborative anomaly detection system for sel sh node attacks in MANET, Journal of Critical Reviews vol. 7, no. 13 (2020) 148-154.
[23] M. Ponnusamy, A. Senthilkumar, R. Manikandan, Detection of sel sh nodes through reputation model in Mobile Ad hoc Network{MANET, Turkish Journal of Computer and Mathematics Education vol. 12, no. 9 (2021) 2404-2410.
[24] M.A. Gabri, L. I. Chunlin , Y.Zhiyong, A. H. Naji Hasan, and Z. Xiaoqing, Improved the energy of ad hoc on-demand distance vector routing protocol, Proceedings of the International Conference on Future Computer Supported Education, (2012), 355 { 361.
[25] M. Khaeel Ullah Khan and K.S. Rame, E ect on packet delivery ratio (PDR) through-put in wireless sensor networks due to black hole attack, International Journal of Innovative Technology and Exploring Engineering (IJITE) vol. 8, no. 12S (October 2019ar)428-432.
[26] L. W. Wu and R.-F. Yu, A threshold-based method for sel sh nodes detection in MANET, Proceedings of the IEEE International Computer Symposium (ICS2010), (2010), 875-882.