1. Adamic, L.A.: Zipf, Power-laws and Pareto - a ranking tutorial (2002)
2. Anjum, F., Subhadrabandhu, D., Sarkar, S., Shetty, R.: On optimal placement of intrusion detection modules in sensor networks. In: Proceedings of the 1st International Conference on Broadband Networks, 2004. pp. 690–699, October 2004
3. Apple-Inc: Bonjour for developers.
https://developer.apple.com/bonjour/index.html
. Accessed on 12 November 2014
4. Bellovin, S.M., Keromytis, A., Cheswick, B.: Worm propagation strategies in an IPv6 internet. Login 31, 70–76 (2006). Please check the edit made in Ref. [4]
5. Bui, T.N., Jones, C.: Finding good approximate vertex and edge partitions is NP-hard. Inf. Process. Lett. 42(3), 153–159 (1992)