[1] E. M. Shakshuki, N. Kang, and T. R. Sheltami, "EAACK—a secure intrusion-detection system for MANETs," IEEE transactions on industrial electronics, vol. 60, pp. 1089-1098, 2013.
[2] C. Atheeq and M. M. A. Rabbani, "Secure Data transmission in integrated internet MANETs based on effective trusted knowledge algorithm," Indian Journal of Science and Technology, vol. 9, 2016.
[3] A. Roy, S. Bose, T. Acharya, and S. DasBit, "Social-based energy-aware multicasting in delay tolerant networks," Journal of Network and Computer Applications, vol. 87, pp. 169-184, 2017.
[4] A. Roy, T. Acharya, and S. DasBit, "Social-Based Congestion-Aware Multicast in Delay Tolerant Networks," in Proceedings of the ACM Workshop on Distributed Information Processing in Wireless Networks, 2017, p. 5.
[5] X. Tan, Z. Xiong, and Y. He, "Signal attenuation-aware clustering in wireless mobile ad hoc networks," Journal of Networks, vol. 8, pp. 796-803, 2013.
[6] S. Gundry, J. Zou, M. U. Uyar, C. S. Sahin, and J. Kusyk, "Differential evolution-based autonomous and disruption tolerant vehicular self-organization in MANETs," Ad Hoc Networks, vol. 25, pp. 454-471, 2015.
[7] S. Kushwaha and V. Lokhande, "Security in Wireless Mobile Ad-Hoc Network Nodes Using Novel Intrusion Detection System," International Journal of Engineering Science, vol. 3352, 2016.
[8] H. Kaur and S. Singh, "Wormhole Attack Detection and Prevention in MANET Using Bait Scheme," International Journal of Engineering Science, vol. 11640, 2017.
[9] N. B. Truong, G. M. Lee, and Y. Ghamri-Doudane, "Software defined networking-based vehicular adhoc network with fog computing," in Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on, 2015, pp. 1202-1207.
[10] G. Mahadevan, "A combined scheme of video packet transmission to improve cross layer to support QoS for MANET," Alexandria Engineering Journal, 2017.
[11] M. N. Ahmed, A. H. Abdullah, H. Chizari, and O. Kaiwartya, "F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs," Journal of King Saud University-Computer and Information Sciences, 2016.
[12] S. Bade, M. Kumar, and P. Kamat, "A reactive energy-alert algorithm for manet and its impact on node energy consumption," International Journal of Computer Applications, vol. 71, 2013.
[13] Y.-H. Chen, E. H.-K. Wu, and G.-H. Chen, "Bandwidth-Satisfied Multicast by Multiple Trees and Network Coding in Lossy MANETs," IEEE Systems Journal, 2015.
[14] Q. Yu, R. Wang, K. Zhao, W. Li, X. Sun, J. Hu, et al., "Modeling RTT for DTN protocol over asymmetric cislunar space channels," IEEE Systems Journal, vol. 10, pp. 556-567, 2016.
[15] Y. Cao, K. Wei, G. Min, J. Weng, X. Yang, and Z. Sun, "A Geographic Multicopy Routing Scheme for DTNs With Heterogeneous Mobility," IEEE Systems Journal, 2016.
[16] T. Wang, Y. Cao, Y. Zhou, and P. Li, "A survey on geographic routing protocols in delay/disruption tolerant networks," International Journal of Distributed Sensor Networks, vol. 12, p. 3174670, 2016.
[17] Y. Cao, N. Wang, Z. Sun, and H. Cruickshank, "A reliable and efficient encounter-based routing framework for delay/disruption tolerant networks," IEEE Sensors Journal, vol. 15, pp. 4004-4018, 2015.
[18] A. Basit, S. B. Qaisar, H. R. Syed, and M. Ali, "SDN Orchestration for Next Generation Inter-Networking: A Multipath Forwarding Approach," IEEE Access, 2017.
[19] J. Son, A. V. Dastjerdi, R. Calheiros, and R. Buyya, "SLA-aware and Energy-Efficient Dynamic Overbooking in SDN-based Cloud Data Centers," IEEE Transactions on Sustainable Computing, 2017.
[20] V. G. Nguyen and Y. Kim, "Proposal and evaluation of SDN‐based mobile packet core networks," EURASIP Journal on Wireless Communications and Networking, vol. 2015, pp. 1-18, 2015.
[21] J. Wang, Y. Yang, J. Mao, Z. Huang, C. Huang, and W. Xu, "Cnn-rnn: A unified framework for multi-label image classification," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 2285-2294.
[22] T. Zhu, D. Feng, F. Wang, Y. Hua, Q. Shi, Y. Xie, et al., "A Congestion-Aware and Robust Multicast Protocol in SDN-based Data Center Networks," Journal of Network and Computer Applications, 2017.
[23] V.-G. Nguyen, T.-X. Do, and Y. Kim, "SDN and virtualization-based LTE mobile network architectures: A comprehensive survey," Wireless Personal Communications, vol. 86, pp. 1401-1438, 2016.
[24] A. Blenk, A. Basta, M. Reisslein, and W. Kellerer, "Survey on network virtualization hypervisors for software defined networking," IEEE Communications Surveys & Tutorials, vol. 18, pp. 655-685, 2016.
[25] S. Park and Y. Yoo, "Network Intelligence Based on Network State Information for Connected Vehicles Utilizing Fog Computing," Mobile Information Systems, vol. 2017, 2017.
[26] S. Sundar, P. Arora, S. Agrawal, R. Kumar, and H. M. Kittur, "Testing MANET Protocol using Zigbee based Xbee Modules," Indonesian Journal of Electrical Engineering and Computer Science, vol. 3, pp. 441-445, 2016.
[27] J. Garcia-Luna-Aceves, "MANET Protocol Simulations Considered Harmful: The Case for Benchmarking," IEEE Wireless Communications, 2013.
[28] M. Bidaki and M. Masdari, "Reputation-based clustering algorithms in mobile ad hoc networks," International Journal of Advanced Science and Technology, vol. 54, pp. 1-12, 2013.
[29] B. Rashid, M. H. Rehmani, and A. Ahmad, "Broadcasting strategies for cognitive radio networks: taxonomy, issues, and open challenges," Computers & Electrical Engineering, vol. 52, pp. 349-361, 2016.
[30] A. Detti, D. Tassetto, N. B. Melazzi, and F. Fedi, "Exploiting content centric networking to develop topic-based, publish–subscribe MANET systems," Ad hoc networks, vol. 24, pp. 115-133, 2015.
[31] A. Vahdat and D. Becker, "Epidemic routing for partially connected ad hoc networks," 2000.
[32] A. Lindgren, A. Doria, and O. Schelen, "Probabilistic routing in intermittently connected networks," Service assurance with partial and intermittent resources, pp. 239-254, 2004.