1. Aggarwal CC, Yu PS (2008) Outlier detection with uncertain data. In: SIAM international conference on data mining (SDM), pp 483–493
2. Artikis A, Sergot M, Pitt J (2009) Specifying norm-governed computational societies. ACM Trans Comput Logic 10: 1–42
3. Becker MY (2010) Information flow in credential systems. IEEE Comput Secur Found Symp 0: 171–185
4. Beydoun G, Low G, Mouratidis H, Henderson-Sellers B (2009) A security-aware metamodel for multi-agent systems (MAS). Inf Softw Technol 51(5): 832–845
5. Bierman E, Cloete E (2002) Classification of malicious host threats in mobile agent computing. In: SAICSIT’02: Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on enablement through technology. South African Institute for Computer Scientists and Information Technologists, South Africa, pp 141–148