Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary gameKarima Adel-Aissanou, Sara Berri, Myria Bouhaddi and Mohammed Said RadjefRAIRO-Oper. Res., 50 2 (2016) 285-296DOI: https://doi.org/10.1051/ro/2015047