Mitigating routing misebehaviour in mobile ad-hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking (MobiCom), 2000. ,
Toward a cross-layer monitoring process for mobile ad hoc networks, Security and Communication Networks, pp.351-368, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00619749
Cross-layer approach to improve the monitoring process for mobile ad hoc networks based on ieee 802, IEEE Global Telecommunications Conference (GLOBECOM), 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00680886
Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pp.107-121, 2002. ,
DOI : 10.1007/978-0-387-35612-9_9
Selfish misbehavior detection in 802.11 based wireless networks: An adaptive approach based on Markov decision process, 2013 Proceedings IEEE INFOCOM, 2013. ,
DOI : 10.1109/INFCOM.2013.6566929
MIMODog: How to solve the problem of selfish misbehavior detection mechanism in MANETs using MIMO technology, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), 2012. ,
DOI : 10.1109/IWCMC.2012.6314226
URL : https://hal.archives-ouvertes.fr/hal-00687192
Space-mac: Enabling spatial reuse using mimo channel-aware mac, Proceedings of International Conference Communications (ICC), 2005. ,
DOMINO, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.1691-1705, 2006. ,
DOI : 10.1145/990064.990077
Performance analysis of the cofidant protocol, Proceedings of 3rd ACM international Symposium on Mobile ad hoc networking & computing ad hoc networks, pp.226-236, 2002. ,
A reputation system for wireless mesh networks using network coding, Journal of Network and Computer Applications, vol.34, issue.2, pp.535-541, 2011. ,
DOI : 10.1016/j.jnca.2010.12.016
RETENTION: A reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments, Journal of Network and Computer Applications, vol.36, issue.1, pp.274-283, 2013. ,
DOI : 10.1016/j.jnca.2012.06.002
URL : https://hal.archives-ouvertes.fr/hal-00865305
Conflicts and Incentives in Wireless Cooperative Relaying: A Distributed Market Pricing Framework, IEEE Transactions on Parallel and Distributed Systems, pp.758-772, 2011. ,
DOI : 10.1109/TPDS.2010.152
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs, Mobile Networks and Applications, vol.22, issue.4, pp.191-204, 2010. ,
DOI : 10.1007/s11036-009-0164-7
URL : https://hal.archives-ouvertes.fr/hal-00619750
Enforcing service availability in mobile ad-hoc WANs, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444), pp.87-96, 2000. ,
DOI : 10.1109/MOBHOC.2000.869216
Analysis of a Hybrid Reputation Management System for Mobile Ad hoc Networks, 2009 Proceedings of 18th International Conference on Computer Communications and Networks, 2009. ,
DOI : 10.1109/ICCCN.2009.5235332
An efficient bandwidth guaranteed routing for ad hoc networks using ieee 802.11 with interference consideration, Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems , MSWiM '07, 2007. ,
DOI : 10.1145/1298126.1298171
A characterization of perfect graphs, Journal of Combinatorial Theory, Series B, vol.13, issue.2, pp.95-98, 1972. ,
DOI : 10.1016/0095-8956(72)90045-7
Bandwidth Guaranteed routing for Ad hoc Networks with Interference Consideration, IEEE Symposium on Computers and Communication (ISCC), 2014. ,
The capacity of wireless networks, IEEE Transactions in Information Theory, pp.388-404, 2000. ,
DOI : 10.1109/18.825799
On the Asymptotic Capacity of Multi-Hop MIMO Ad Hoc Networks, IEEE Transactions in Wireless Communications, pp.1032-1037, 2011. ,
DOI : 10.1109/TWC.2011.020111.100528