T. Clausen and P. Jacquet, Optimized link state routing protocol (OLSR), " IETF experimental RFC 3626, 2003.

F. Cuppens, N. Cuppens-boulahia, and S. Nuon, Property Based Intrusion Detection to Secure OLSR, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07), 2007.
DOI : 10.1109/ICWMC.2007.72

W. Cohen, Fast Effective Rule Induction, ICML, 1995.
DOI : 10.1016/B978-1-55860-377-6.50023-2

M. Wang, L. Lamont, and P. Mason, An effective intrusion detection approach for OLSR MANET protocol, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)., 2005.
DOI : 10.1109/NPSEC.2005.1532054

A. Adnane, R. Sousa, and C. Bidan, Autonomic trust reasoning enables misbehavior detection in OLSR, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, 2008.
DOI : 10.1145/1363686.1364173

URL : https://hal.archives-ouvertes.fr/hal-00353032

G. Vigna, S. Gwalani, and K. Srinivasan, An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks, 20th Annual Computer Security Applications Conference, 2004.
DOI : 10.1109/CSAC.2004.6

N. Peng and S. Kun, How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols, Ad Hoc Network, vol.3, issue.6, 2005.

A. Adnane, C. Bidan, and R. Junior, Trust-Based Countermeasures for Securing OLSR Protocol, 2009 International Conference on Computational Science and Engineering, 2009.
DOI : 10.1109/CSE.2009.130

J. Haerri, F. Filali, and C. Bonnet, Performance comparison of AODV and OLSR in vanets urban environments under realistic mobility patterns, IFIP Med-Hoc-Net workshop, 2006.

C. Tseng, S. Tao, and P. Balasubramanyam, A Specification-Based Intrusion Detection Model for OLSR, RAID, 2008.
DOI : 10.1007/11663812_17

Y. Zhang and W. Lee, Intrusion detection in wireless ad-hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000.
DOI : 10.1145/345910.345958

T. Joachims, Making large-scale support vector machine learning practical, 1999.

S. Kurosawa, H. Nakayama, and N. Kato, Detecting blackholes attack on AODV-based mobile ad hoc networks by dynamic learning method, International journal of network security, vol.5, issue.3, 2007.

L. Bononi and C. Tacconi, Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks, International Journal of Information Security, vol.7, issue.1, 2007.
DOI : 10.1007/s10207-007-0035-9

Y. Huang, W. Fan, and W. Lee, Cross-feature analysis for detecting ad-hoc routing anomalies, IEEE ICDCS, 2003.

J. Quinlan, C4.5: programs for machine learning, 1993.

J. Cabrera, C. Gutierrez, and R. Mehra, Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks, Information Fusion, vol.9, issue.1, 2008.
DOI : 10.1016/j.inffus.2007.03.001