[1] J. Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network survey,” Computer networks, Vol. 52, no, 12, pp. 2292-2330, 2008.
[2] C. Fragouli, E. Soljanin, “Network Coding Applications,” Now Publishers, 2008.
[3] T. Ho and D. S. Lun, “Network coding: an introduction,” Cambridge University Press, 2008.
[4] A. Mukherjee, S. A. A. Fakoorian, J. Huang, A. L. Swindlehurst, “Principles of physical layer security” in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, Vo. 16, no, 3, pp. 1550-1573, 2014.
[5] F. Chen, T. Xiang, Y. Yang, S. S. Chow, “Secure cloud storage meets with secure network coding,” IEEE Transactions on Computers, Vol. 65, no. 6, pp. 1936-1948, 2016.
[6] I. H. Hou, “Broadcasting delay-constrained traffic over unreliable wireless links with network coding,” IEEE/ACM Transactions on Networking (TON), Vol. 23, no. 3, pp. 728-740, 2015.
[7] M. Xiao, T. Aulin, "Optimal decoding and performance analysis of a noisy channel network with network coding," IEEE Transactions on Communications, Vol. 57, No. 5, pp. 1402-1412, 2009.
[8] P. Li, S. Guo, S. Yu, A. V. Vasilakos, “Reliable multicast with pipelined network coding using opportunistic feeding and routing,” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, no. 12, pp. 3264-3273, 2014.
[9] S. Jaggi, P. A. Chou, K. Jain, "Low complexity algebraic multicast network codes," In IEEE International Symposium on Information Theory, pp. 368-368, 2003.
[10] S. Kafaie, Y. Chen, O. A. Dobre, M. H. Ahmed, “Joint Inter-flow Network Coding and Opportunistic Routing in Multi-hop Wireless Mesh Networks: A Comprehensive Survey,” IEEE Communications Surveys & Tutorials, 2018.
[11] M. Khalily-Dermany, M. Sabaei, and M. Shamsi. "Topology control in network–coding–based–multicast wireless sensor networks," International Journal of Sensor Networks, Vol. 17, No. 2, pp. 93-104, 2015.
[12] M. Khalily-Dermany, “A convex programming for range assignment to optimize lifetime in network-coding-based-wireless-sensor networks,” International Journal of Wireless Information Networks, pp. 1-6, 2017.
[13] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft, "XORs in the air: practical wireless network coding," IEEE/ACM Transaction on Networking, Vol. 16, No. 3, pp. 497-510, 2008.
[14] S. Y. R. Li, R. W. Yeung, C. Ning, "Linear network coding," IEEE Transactions on Information Theory, Vol. 49, No. 2, pp. 371-381, 2003.
[15] R. Mohammadi, A. Ghaffari, “Optimizing reliability through network coding in wireless multimedia sensor networks,” Indian Journal of Science and Technology, Vol. 8, no. 9, pp. 834-839, 2015.
[16] K. Fan, L. X. Li, D. Y. Long, "Study of on-demand COPE-aware routing protocol in wireless mesh networks," Tongxin Xuebao/Journal on Communications, Vol. 30, No. 1, pp. 128-134, 2009.
[17] K. Chi, X. Jiang, S. Horiguchi, "A more efficient COPE architecture for network coding in multihop wireless networks," IEICE Transactions on Communications, Vol. E92-B, No. 3, pp. 766-775, 2009.
[18] M. Khalily-Dermany, M. J. Nadjafi-Arani, “Itinerary planning for mobile sinks in network-coding-based wireless sensor networks,” Computer Communications, Vol. 111, pp. 1-13, 2017.
[19] D. S. Lun, "Minimum-cost multicast over coded packet networks," IEEE Transactions on Information Theory, Vol. 52, No. 6, pp. 2608-2623, 2006.
[20] H. Xing, Z. Wang, T. Li, H. Li, R. Qu, “An improved MOEA/D algorithm for multi-objective multicast routing with network coding, “ Applied Soft Computing, Vol. 59, pp. 88-103, 2017.
[21] S. Boyd, L. Vandenberghe, “Convex Optimization,” Cambridge University Press, 2004.
[22] D. P. Bertsekas, A. Nedić, A. E. Ozdaglar, “Convex Analysis and Optimization,” Athena Scientific, 2003.
[23] D. P. Bertsekas, “Constrained optimization and Lagrange multiplier methods,” Athena Scientific, 1996.
[24] D. P. Bertsekas, “Network optimization: continuous and discrete models,” Athena Scientific Belmont, Massachusetts, 1998.
[25] R. Fourer, D. M. Gay, B. Kernighan, “AMPL,” Vol. 117, Danvers, MA: Boyd & Fraser, 1993.