1.
X. Li, M. Yang, C. Men, Y. Jiang, and K. Udagepola, “Access-Pattern Aware Checkpointing data storage scheme for mobile computing environment,†Procedia Computer Science, 34 (2014) 330 – 337, Elsevier, 2014.
2.
D. Gavalas, G. Pantziou, C. Konstantopoulos, and B. Mamalis, “Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach,†unpublished.
3.
A.K. Singh, and P.K. Jaggi, “Asynchronous Rollback Recovery in cluster based Multi Hop Mobile Ad Hoc Networks,†International Journal of Enhanced Research in Management & Computer Applications, ISSN: 2319-7471, vol. 2 issue 6, June-2013.
4.
P. Gera, K. Garg, and M. Misra, “Trust-based Multi-Path Routing for Enhancing Data Security in MANETs,†International Journal of Network Security, vol.16, no.2, pp. 102-111, March 2014.
5.
R. Tuli, and P. Kumar, “Asynchronous Checkpointing and Optimistic Message Logging for Mobile Ad Hoc Networks,†(IJACSA) International Journal of Advanced Computer Science and Applications, vol. 2, no. 10, 2011.
6.
C.M. Jadhav, A.R. Shegadar, and S. Shabade, “Dual-Link Failure Resiliency through Backup Link Mutual Exclusion,†International Journal Of Engineering And Computer Science, ISSN:2319-7242, volume 3 issue, December 2014.
7.
S. Biswas, P. Dey, and S. Neogy, “Trusted checkpointing based on Ant Colony Optimization in MANET,†Third International Conference on Emerging Applications of Information Technology (EAIT), 2012.
8.
P. Sharma and N. Khurana, “Study of Optimal Path Finding Techniques,†International Journal of Advancements in Technology, vol. 4 no. 2, July 2013.
9.
K. Govindan, and P. Mohapatra, “Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey,â€, IEEE.
10.
S. Biswas, S. Neogy, and P. Dey, “Mobility based checkpointing and trust based recovery in MANET,†International Journal of Wireless & Mobile Networks (IJWMN), vol. 4, no. 4, August 2012.
11.
S. Biswas, P. Dey, and S. Neogy, “Secure Checkpointing-Recovery using Trusted Nodes in MANET,†4th International Conference on Computer and Communication Technology (ICCCT), 2013.
12.
R. Tuli, and P. Kumar, “Minimum process coordinated checkpointing scheme for ad hoc networks,†International Journal on AdHoc Networking Systems (IJANS), vol. 1, no. 2, October 2011.
13.
P. Sharma, and A. Khunteta, “A Survey of Checkpointing Algorithms in Mobile Ad HocNetwork,†Global Journal of Computer Science and Technology Network, Web & Security, (USA), volume 12 issue 12, version 1.0, 2012.
14.
S. Behzadi and A.A. Alesheikh, “A Pseudo Genetic Algorithm for solving best path problem,†The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, vol. 3,. part B2, 2008.
15.
Z. Ishrat and K.B. Ali, “Optimization of Route in a Network using Genetic Algorithm,†International Journal of Computer Applications (IJCA), ISSN: 0975–8887, 2013
16.
R. Kaur and Dr. N. Sharma, “Checkpointing and Trust based Recovery in MANET: A Survey,†Advances in Computer Science and Information Technology (ACSIT), ISSN: 2393-9907, May 2015.
17.
P.P. Rewagad, and S.R. Suryawanshi, “Implementation of Trust Aware Routing Framework with Link Failure Consideration and Recovery,†International Journal of Research in Computer and Communication Technology, vol 3, issue 9, September 2014.
18.
A. Patnaik, L.K. Awasthi, and K. Dutta, “Analysis on Checkpointing Scheme Paradigms for Mobile Ad-hoc Network: A Review,†IJCSC, vol. 3, no.2, January-June 2012.
19.
D. Maheshwari, and A.Dhanalakshmi, “Fault Tolerance in Mobile ad hoc Network: A Survey,†International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, issue 3, March 2013.
20.
R. Dalal, M. Khari, and Y. Singh, “Different ways to achieve Trust in MANET,†International Journal on AdHoc Networking Systems (IJANS), vol. 2, no. 2, April 2012.
21.
B. J. Oommen, and L. Rueda, “Fault-Tolerant Routing in Mobile Ad Hoc Networks,†www.intechopen.com.
22.
P. Aggarwal, “A Study on achieving Fault Tolerance in Mobile Ad-Hoc Networks (MANETs),†Journal of Global Research in Computer Science, ISSN: 2229-371X, vol. 4, no. 12, December 2013.
23.
J.W. Huang, I. Woungang, H.C. Chao, M.S. Obaidat, T.Y. Chi, and S.K. Dhurandher, “Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks,†IEEE Globecom, 2011.
24.
R. Li, J. Li, P. Liu, and H.H. Chen, “An Objective Trust Management Framework for Mobile Ad Hoc Networks,†IEEE Vehicular Technology Conference, ISSN: 1550-2252, April, 2007.