· افشار هراتی، نسرین. (1400). بررسی ساختارهای امنیت در شبکههای Ad Hoc با رویکرد نو، پنجمین همایش بینالمللی دانش و فناوری مهندسی برق، کامپیوتر و مکانیک ایران، تهران، .https://civilica.com/doc/1238055
· شاهسوندی، محمد. (1392). شبکه اد هاک، پایاننامه کارشناسی ارشد، مهندسی فناوری اطلاعات، دانشکده مهندسی، دانشگاه پیام نور واحد ایذه، ایذه.
· محمدی حمیدرضا. بررسی روشهای نفوذ در شبکههای بیسیم wi-fi. امنیت فضای تولید و تبادل اطلاعات (منادی). ۹(۱): ۳۸-۳۱.
· Abusalah, L., Khokhar, A., & Guizani, M. (2008). A survey of secure mobile Ad Hoc routing protocols. 10(4), 78-93. doi:10.1109/SURV.2008.080407.
· Agrawal, R., Faujdar, N., Romero, C., Sharma, O., Abdulsahib, G., Khalaf, O., Ghoneim, O. (2023, March ). Classification and comparison of ad hoc networks: A review. Egyptian Informatics Journal, 24(1), 1-25. doi:https://doi.org/10.1016/j.eij.2022.10.004.
· Barmanroy, D., & Chaki, R. (2014). Different Types of Attacks for WANs. In N. Chaki, & R. Chaki, Intrusion Detection in Wireless Ad-Hoc Networks (pp. 95-110).
· Basagni, S., Conti, M., Giordano, S., & Stojmenovic, I. (2013). Mobile Ad Hoc Networking: Cutting Edge Directions (Second ed., Vol. 23).
· Chang, T.-H., Lin, J.-W., Chen, C.-M., & Lai, G.-H. (2018). The Method of Capturing the Encrypted Password Packets of WPA & WPA2, Automatic, Semi-Automatic or Manual? 2018 IEEE Conference on Dependable and Secure Computing (DSC) (pp. 1-4). Kaohsiung, Taiwan: IEEE. doi:10.1109/DESEC.2018.8625156
· Copeland, M. (2021). Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud. New Braunfels, TX, USA. doi:https://doi.org/10.1007/978-1-4842-7132-2.
· Enterprise Matrix. (2020, Decamber 29). Retrieved from attack.mitre.org: https://attack.mitre.org/matrices/enterprise/ Enterprise Matrix.
· FM 3-0. (2017, October 6). Operations. Headquarters, Department Of The Army. Washington: Department of the Army USA.
· Harris Corporatio. (2024). AN/PRC-167 MULTI-CHANNEL MANPACK. Retrieved from www.l3harris.com: https://www.l3harris.com/all-capabilities/an-prc-167-multi-channel-manpack.
· Harris Corporation. (2024, January 13). AN/PRC-163 MULTI-CHANNEL HANDHELD RADIO. Retrieved from www.l3harris.com/: https://www.l3harris.com/all-capabilities/an-prc-163-multi-channel-handheld-radio.
· Nabben, K., & Rennie, E. (2022). Ad hoc network. Internet Policy Review, 11(2). Retrieved from https://doi.org/10.14763/2022.2.1666.
· Sbai, O., & Elboukhari, M. (2018). Classification of Mobile Ad Hoc Networks Attacks. Chulalongkorn University provided by UniNet, 618-624.
· Singh, J., Dutta, P., & Chakrabarti, A. (2018). Ad Hoc Networks (1 ed.). Springer Singapore. doi:https://doi.org/10.1007/978-981-10-8770-7.
· Stukova , I., & Crawford, B. (2019, Lune). Short-Term Self-Moving Tactical Networks In Austere Environments. Master Of Science In Network Operations And Technology, 123. Monterey, California.
· Toh, C., Lee, E., & Ramos, N. (2004). Next-generation tactical ad hoc mobile wireless. Technology Review Journal, 125.