1. Ribeiro, F.J.L., Pedroza, A.d.C.P. and Costa, L.H.M.K., "Underwater monitoring system for oil exploration using acoustic sensor networks",
Telecommunication Systems, Vol. 58, No. 1, (2015), 91-106.
2. Li, X., Han, G., Qian, A., Shu, L. and Rodrigues, J., "Detecting sybil attack based on state information in underwater wireless sensor networks", in Software, Telecommunications and Computer Networks (SoftCOM), 2013 21st International Conference on, IEEE., (2013), 1-5.
3. Du, X., Peng, C. and Li, K., "A secure routing scheme for underwater acoustic networks",
International Journal of Distributed Sensor Networks, Vol. 13, No. 6, (2017), doi: 10.1177/1550147717713643.
4. Bharamagoudra, M.R. and Manvi, S.S., "Agent‐based secure routing for underwater acoustic sensor networks",
International Journal of Communication Systems, Vol. 30, No. 13, (2017), e3281.
5. Dargahi, T., Javadi, H.H. and Shafiei, H., "Securing underwater sensor networks against routing attacks",
Wireless Personal Communications, Vol. 96, No. 2, (2017), 2585-2602.
6. Ateniese, G., Capossele, A., Gjanci, P., Petrioli, C. and Spaccini, D., "Secfun: Security framework for underwater acoustic sensor networks", in Proceedings of MTS/IEEE OCEANS. (2015), 1-9.
7. Basagni, S., Petrioli, C., Petroccia, R. and Spaccini, D., "Carp: A channel-aware routing protocol for underwater acoustic wireless networks",
Ad Hoc Networks, Vol. 34, (2015), 92-104.
8. Gomathi, R. and Manickam, J.M.L., "Energy efficient shortest path routing protocol for underwater acoustic wireless sensor network",
Wireless Personal Communications, Vol. 98, No. 1, (2018), 843-856.
9. Bu, R., Wang, S. and Wang, H., "Fuzzy logic vector–based forwarding routing protocol for underwater acoustic sensor networks",
Transactions on Emerging Telecommunications Technologies, Vol. 29, No. 3, (2018), doi: 10.1002/ett.3252.
10. Taghizadeh, S. and Mohammadi, S., "Lebrp-a lightweight and energy balancing routing protocol for energy-constrained wireless ad hoc networks",
International Journal of Engineering-Transactions A: Basics, Vol. 27, No. 1, (2013), 33-38.
11. Pouyan, A. and Yadollahzadeh Tabari, M., "Estimating reliability in mobile ad-hoc networks based on monte carlo simulation",
International Journal of Engineering, Vol. 7, No. 5, (2014), 739-746.
12. Zhang, R., Sun, J., Zhang, Y. and Huang, X., "Jamming-resilient secure neighbor discovery in mobile ad hoc networks",
IEEE Trans. Wireless Communications, Vol. 14, No. 10, (2015), 5588-5601.
13. Zhang, Y., Liu, W., Lou, W. and Fang, Y., "Location-based compromise-tolerant security mechanisms for wireless sensor networks",
IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, (2006), 247-260.
14. Heinzelman, W.R., Chandrakasan, A. and Balakrishnan, H., "Energy-efficient communication protocol for wireless microsensor networks", in System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on, IEEE., (2000), doi: 10.1109/HICSS.2000.926982.