1. Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., Lee, H.-J.: An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor networks-based applications. MDPI Sens. 14(2), 2732–2755 (2014)
2. Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, M.: Multi agent simulation using discrete event and soft-computing methodologies. Proc. IEEE Int. Conf. Syst. Man Cybern. 2, 1711–1716 (2003)
3. Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proceedings of the First International Workshop on Safety and Security in Multi-agent Systems (SASEMAS 2004), pp. 85–101 (2004)
4. Lecture Notes in Computer Science;IA Zikratov,2014
5. Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of autonomous systems employing embedded computing and sensors. IEEE Micro 33(1), 80–86 (2013). Art. no. 6504448