1. S. Yu, X. Lin, J. Misic and X. Shen (eds). "Networking for Big Data", CRC Press 2015
  2. V. B. Mišić and J. Mišić (eds.).  Machine-To-Machine Communications – Architectures, Technology, Standards, and Applications. Boca Raton, FL: CRC Press, 2014.
  3. J. Mišic and V. B. Mišic."Wireless Personal Area Networks: Performance, Interconnection and Security with IEEE.802.15.4". Chichester, UK: John Wiley & Sons, Hardcover: 320 pages ISBN-10: 0470518472 ISBN-13: 978-0470518472 , 2008
  4. J. Mišic and V. B. Mišic. Performance Modeling and Analysis of Bluetooth Networks: Network Formation, Polling, Scheduling, and Traffic Control. Boca Raton, FL: CRC Press, Hardcover, 309 pages, 2006, ISBN 0-8493-3157-9.
  5. Book Chapters

    1. H. Khojasteh, J. Misic and VB. Misic "Admission control in cloud systems", chapter in Book, Advances in Mobile Cloud Computing Systems, 2015, Eds R. F. Yu. and VCM. Leung
    2. C. Campolo, A. Molinaro, R. Scopigno, S. Ozturk, J. Mišić, and V. B. Mišić.  “The MAC Layer of VANETs”, chapter 4 (pp 83-122) in Vehicular ad hoc Networks, C. Campolo, A. Molinaro, and R. Scopigno (eds.), Springer-Verlag, 2015
    3. N. Beigi Mohammadi, Jelena Misic, Vojislav B. Misic, and Hamzeh Khazaei: "Intrusion Detection System for Machine-to-Machine Communication in Smart Grid" , in book Machine-To-Machine Communications – Architectures, Technology, Standards, and Applications, Jelena Mišić and Vojislav B. Mišić (eds.), Boca Raton, FL: CRC Press, 2014.
    4. H. Khazaei, J. Misic V. Misic: "Performance Evaluation of Cloud Data Centers with Batch Task Arrivals", Chapter 9 in Communication Infrastructures for Cloud Computing: Design and Applications, edited by H. Mouftah and B. Kantarci, published by IGI Global, 2013, HersheyPA, 17033, pp. 199-223, ISBN 978-1-4666-4522-6

    1. H. Khazaei, J. Misic V. Misic " On the performance and dimensioning
      of cloud computing ", Chapter 8  in Cloud computing: methodology, system, and applications, edited by L Wang, R Ranjan, J Chen, B Benatallah, pp. 151-165  CRC, FL: CRC Press, 2011

    2. V. B. Mišić and J. Mišić: “Cognitive MAC Protocol with Transmission Tax: Probabilistic Analysis and Performance Improvements, in Cognitive Radio Mobile Ad Hoc Networks, Richard Yu (editor), Springer , 1st edition, ISBN 978-1-4419-6171-6, 2010

    3. Md. M. Haque, J. Mišic, V. B. Mišic, S. Biswas, and S. Rashwand. "Vehicular network security", in Encyclopedia of Wireless and Mobile Communications, 2nd edition, Borko Furht (editor), Boca Raton, FL: CRC Press, 2009

    4. J. Mišic , M. A. I. Khair, and V. Mišic (2009). "Performance of bridging algorithms in IEEE 802.15.3 multi-piconet networks", chapter in Handbook on Sensor Networks, edited by Hui Chen, Yang Xiao and Frank Li, New York: World Scientific.

    5. J. Mišic and V. B. Mišic (2009). "Patient privacy in healthcare wireless sensor networks", chapter in Handbook of Security and Networks, edited by Yang Xiao, Frank Li and Hui Chen, New York: World Scientific.

    6. J. Mišic (2009). "Tradeoff between key-exchange frequency and network lifetime for interconnected IEEE 802.15.4 Beacon Enabled clusters", chapter in From Problem to Solution: Wireless Sensor Networks Security, edited by Zhen Jiang and Yi Pan, Nova Biomedical Books.

    7. J. Mišic (2009). "Impact of reliable and secure sensing on cluster lifetime in IEEE 802.15,4 networks", chapter 16, pp. 389-414,  in Emerging Wireless LANs, Wireless PANs, and Wireless MANs: IEEE 802.11, IEEE 802.15, 802.16 Wireless Standard Family, edited by Y. Xiao and Yi Pan, New York: John Wiley & Sons.
    8. J. Mišic, S. Shafi, and V. B. Mišic (2009). "Admission control issues in 802.15.4 sensor clusters", chapter in Handbook on Mobile Ad Hoc and Pervasive Communications, edited by L. T. Yang and M. Denko, Stevenson Ranch, CA: American Scientific Publishers.
    9. M. A. I. Khair, J. Mišic and V. Mišic (2009). "Piconet Interconnection Strategies in IEEE 802.15.3", chapter 8 in Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications (pp. 147-162), edited by Y. Zhang, L.T. Yang and Jianghua Ma, Boca Raton, FL: Auerbach Publications
    10. F. Amini, M. Khan and J. Mišic (2008). "Power Management and Security in IEEE 802.15.4 Clusters: How to Balance?," chapter 13 in Mobile Telemedicine: A Computing and Networking Perspective (pp. 237-266), edited by Y. Xiao and H. Chen, Boca Raton, FL: Auerbach Publications.
    11. J. Mišic, F. Amini and M. Khan (2007). "Signature-Based Intrusion Detection in Wireless Sensor Networks  implemented over IEEE 802.15.4 beacon enabled clusters", in Encyclopedia of Wireless and Mobile Communications (pp. 404-411), edited by Borko Furht, Boca Raton, FL: CRC Press.

    12. J. Misic , "Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management", Chapter 8, pp. 169-190,  in  Security in Distributed and Networking Systems, edited by Yi Pan and Yang Xiao, published by World Scientific, 2007

    13. J. Mišic and R. Udayshankar, "Cluster Interconnections in IEEE 802.15.4 beacon enabled networks", 

    14. M. Khan and J. Mišic, "Security in IEEE 802.15.4 cluster based networks", Chapter in the book "Security in Wireless Mesh Networks", edited by Yang Zhang, J. Zheng and H. Hu, Auerbach Publications, Taylor & Francis Group 2008

    15. V. B. Mišic and J. Mišic, "Medium Access in Ad Hoc and Sensor Networks", a Chapter in The Handbook of Computer Networks, Edited by H. Bidgoli,  John Wiley & Sons, New York, NY. 2007.
    16. F. Amini, V. B. Mišic and J. Mišic, "Intrusion Detection in Wireless Sensor Networks", Chapter 6, pp 111-128, in Security in Distributed, Grid and Pervasive Computing, Edited by Yang Xiao, Auerbach Publications, Taylor & Francis Group,  2007, ISBN 10: 0-8493-7921-0 , 13: 978-0-8493-7921-5

    17. J. Mišic, V. B. Mišic, "Security Issues in Wireless Sensor Networks used in Clinical Information Systems", Chapter 17 for Wireless/Mobile Network Security, Edited by Prof. Yang Xiao, Prof. Xuemin (Sherman) Shen, and Prof. Ding-Zhu Du, Springer 2007, ISBN-10: 0-387-28040-5, ISBN-13: 978-0-387-28040-0.

    18. J. Mišic, G.R. Reddy, and V. B. Mišic "Activity scheduling in Bluetooth based sensor networks" chapter for "Resource, Mobility and Security Management in Wireless Networks and Mobile Communications"  Auerbach Publications,  Y. Zhang , H. Hu and M. Fujise (editors) , CRC Press, Auerbach Publications, Taylor & Francis Group,  2007

    19. V. B. Mišic, J. Fung, and J. Mišic. "MAC Layer Attacks in 802.15.4 Sensor Networks", chapter 2, pp. 27-46,  in Security in Sensor Networks, Yang Xiao (editor), Auerbach Publications, Taylor & Francis Group,  2007

    20. J. Mišic, V. B. Mišic, and K. L. Chan. "TCP performance in Bluetooth scatternets", chapter 15 in Design and Analysis of Wireless Networks, Yi Pan and Yang Xiao (editors), Nova Science Publishers, 2005, (ISBN 0849328322)
    21. J. Mišic and V. B. Mišic. "Adaptive Cycle-Controlled E-Limited Polling in Bluetooth Piconets", chapter 18, pp. 283-296,  in Handbook  on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks, J. Wu (editor), Auerbach Publications, Taylor & Francis Group, 2006, (ISBN 0849328322)

    22. J. Mišic and V. B. Mišic. "An Overview of Intra- and Inter-Piconet Scheduling Algorithms in Bluetooth", chapter 31, pp. 725-735,  in the Handbook of Algorithms for Mobile and Wireless Networking and Computing, A. Boukerche(editors), CRC Press, 2006 (ISBN: 1584884657)