1. Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., Lee, H.-J.: An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Networks-based Applications. MDPI Sensors 14(2), 2732–2755 (2014)
2. Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711–1716 (2003)
3. Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85–101 (2004)
4. Peters, J.F.: Approximation spaces for hierarchical intelligent behavioral system models. Advances in Soft Computing (28), 13–30 (2005)
5. Zikratov, I.A., Kozlova, E.V., Stratowa, T.V.: The analysis of vulnerabilities of robotic systems with swarm intelligence. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 5(87), 149–154 (2013)