Survivability modeling and analysis on 3D mobile ad-hoc networks, Journal of Central South University of Technology, vol.18, issue.4, pp.1144-1152, 2011. ,
Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking, pp.255-265, 2000. ,
Stimulating cooperation in self-organizing mobile ad hoc networks, Mobile Networks and Applications, vol.8, issue.5, pp.579-592, 2003. ,
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks, Twenty-Second Annual Joint Conf. IEEE Computer and Communications (INFOCOM), pp.1987-1997, 2003. ,
Observation-based cooperation enforcement in ad hoc networks, 2003. ,
Smart: A secure multilayer creditbased incentive scheme for delay-tolerant networks, Journal of IEEE Transactions on Vehicular Technology, vol.58, issue.8, pp.4628-4639, 2009. ,
X: FESCIM: fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks, Journal of IEEE Transactions on Mobile Computing, vol.11, issue.5, pp.753-766, 2012. ,
Performance analysis of the CONFIDANT protocol, Proc. The 3rd ACM Int. symposium on Mobile ad hoc networking and computing, pp.226-236, 2002. ,
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Advanced Communications and Multimedia Security, pp.107-121, 2002. ,
SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks, Wireless Communications and Networking, pp.825-830, 2004. ,
Reputation methods for routing security for mobile ad hoc networks, Proc. Mobile Future and Symposium on Trends in Communications, pp.130-137, 2003. ,
TWOACK: preventing selfishness in mobile ad hoc networks, Wireless Communications and Networking, pp.2137-2142, 2005. ,
EAACK-A Secure IntrusionDetection System for MANETs, IEEE Transactions on Industrial Electronics, vol.60, issue.3, pp.1089-1098, 2013. ,
Mathematical Theory of Evidence, 1976. ,
The consistency of Dempster-Shafer updating, International Journal of Approximate Reasoning, vol.7, issue.1, pp.19-44, 1992. ,
Dempster-Shafer theory for intrusion detection in ad hoc networks, IEEE Internet Computer, vol.9, issue.6, pp.35-41, 2005. ,
Dynamic source routing in ad hoc wireless networks. Mobile computing, pp.153-181, 1996. ,
An acknowledgmentbased approach for the detection of routing misbehavior in MANETs, IEEE Transactions on Mobile Computing, vol.6, issue.5, pp.536-550, 2007. ,
Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia systems, vol.15, pp.273-282, 2009. ,
A novel acknowledgment-based approach against collude attacks in MANET, Expert Systems with Applications, vol.39, issue.9, pp.7968-7975, 2012. ,
Defending against packet dropping attack in vehicular ad hoc networks, Security and Communication Networks, vol.1, issue.3, pp.245-258, 2008. ,
An extended approach for Dempster-Shafer theory. Information Reuse and Integration, pp.338-344, 2003. ,
Some aspects of Dempster-Shafer evidence theory for classification of multi-modality medical images considering partial volume effect, Pattern Recognition Letters, vol.17, issue.8, pp.905-919, 1996. ,
A Hybrid Stimulation Approach for Coping Against the Malevolence and Selfishness in Mobile Ad hoc Network, Wireless Personal Communications, vol.88, issue.2, pp.255-281, 2016. ,