[1] P. Albers, O. Camp, J. M. Percher, B. Jouga, L. Me, R. Puttini, “Security in Ad Hoc Networks: a General Intrusion Detection Archtitecture Enhancing Trust Based Approaches”, Proceedings of the First International Workshop on Wireless Networks, 2002
[2] Florina Almenarez, Celeste Campo, “SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks”, the 9th Open European Summer School and IFIP Workshop, 2003
[3] Stefan Axelsson, “Research in Intrusion-Detection System: A Survay”, Department of Computer Engineering, Chalmers University of Technology Goteborg, Sweden, 1999
[4] Yuebin Bai, Hidetsune Kobayashi, “Intrusion Detection System: Technology and Development”, the 17th International Conference on Advanced Information Networking and Applications (AINA’03), IEEE, 2003
[5] John S. Baras, Tao Jiang, “Managing Trust in Self-organized Mobile Ad Hoc Networks”, Collaborative Participation in The Communications and Networks Consortium Sponsored by the US Army Research Laboratory.
[6] Sonja Buchegger, Jean-Yves Le Boudec, “Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks)”, MOBIHOC’02, Jaun 9-11, 2002, EPFL Lausanne, Switzerland.
[7] Cristiano Castelfranchi, Rino Falcone, Giovanni Pezzulo, “Trust in Information Sources as a Source for Trust: A Fuzzy Approach”, the 2nd International Joint Conference, 2003
[8] Partha Dasgupta, Eric Maskin, “Is Majority Rule the Best Voting Method?”, The Department of Economics, the University of Cambridge, UK, 2003
[9] C. Duma, N. Shahmehri, G. Caronni, “Dyamic Trust Metrics for Peer-to-Peer Systems”, the 16th International Workgroup on Database and Expert Systems Applications (DEXA’05), 2005
[10] Nathan Einwechter, “An Introduction To Distributed Intrusion Detection Systems”, Senior Research, 2001
[11] C. English, P. Nixon, S. Terzis, A. McGettrick, H. Lowe, “Dynamic Trust Models for Ubiquitous Computing Environments”, Department of Computer and Information Sciences, University of Strathclyde, Glasgow, Scotland, 2002
[12] Shenglan Hu, Chris J. Mitchell, “Improving IP address autoconfiguration security in MANETs using trust Modelling”, Lecture Notes in Computer Science, 2005
[13] Yi-an Huang, Wenke Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, the 1st ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax, Virginia, 2003
[14] Yichuan Jiang, Zhengyou Xia, Yiping Zhong, Shiyong Zhang, “A Novel Autonomous Trust Management Model for Mobile Agents”, Lecutre Notes in Computer Science 3073:56-65, 2004.
[15] Zhaoyu Liu, Anthony W. Joy, Robert A. Thompson, “A Dyamic Trust Model for Ad Hoc Networks”, the 10th IEEE International Workshop on Future Treads of Distributed Computing System (FTDCS’04), 2004
[16] J. R. Parker, “Voting Methods For Multiple Autonomous Agents”, Intelligent Information Systems, proceeding of the 3rd Australian and New Zealand Conference, 1995
[17] Royce Robbins, “Distributed Intrusion Detection Systems: An Introduction and Review”, GSEC Practical Assignment, SANS Institute, 2003
[18] Kuen-Liang Sue, Chi-Chun Lo, “N-Class Replacement Policy for Resolving Mobility Database Overflow”, National Chiao Tung University, Hsinchu, Taiwan, Proceedings of ICCT, 2003
[19] Kuen-Liang Sue, Chi-Chun Lo, “Overflow control in mobile communication using N-class replacement”, Electronic Letters 23rd January 2003, Vol. 39, No. 2, P238-239
[20] Yan Sun, Wei Yu, Zhu Han, K. J. Ray Liu, “Trust Modeling and Evaluation in Ad Hoc Networks”, Global Telecommunications Conference (GLOBECOM’05), IEEE, 2005
[21] Yuan Yean, William Arbaugh, “A Secure Service Discovery Protocol for MANET”, the 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication Proceedings, 2003
[22] Yongguang Zhang, Wenke Lee, “Intrusion Detection in Wireless Ad-Hoc Networks”, MOBICOM 2000 Boston MA USA, ACM, 2000
[23] 顧吉宇, 羅濟群, “一個針對無基礎行動網路的聯合防禦式的入侵偵測系統”, 資訊管理研究所碩士論文, 國立交通大學, 2004[24] 陳亦明,“分散式系入侵偵測系統研究現況介紹”,資訊安全通訊2002,Vol. 8
[25] Benjurry, “Ad Hoc 安全防�� – Ad Hoc 的安全分析和IDS模型”, Xfocus, 2002