1. Badger L, D’Anna L, Kilpatrick D, Matt B, Reisse A and Van Vleck T. Self-protecting mobile agents obfuscation techniques evaluation report. Network Associates Laboratories, Report (2002)
2. Christian C, Stephen K, Edward C, Clark T. Error-correcting graphs for software watermarking. In: Bodlaender HL, editor. WG 2003, LNCS 2880. Berlin: Springer-Verlag; 2003. p. 156–67.
3. Das S, Luccio FL, Markou E. Mobile agents rendezvous in spite of a malicious agent. In: Bose P, Gąsieniec L, Römer K, Wattenhofer R, editors. Algorithms for sensor systems. ALGOSENSORS 2015. Lecture notes in computer science, vol. 9536. Cham: Springer; 2015. https://doi.org/10.1007/978-3-319-28472-9_16.
4. Dasgupta P, Narasimhan N, Moser LE and Melliar-Smith PM. A supplier driven electronic marketplace using mobile agents. In: Proceedings of the first international conference on telecommunications and E-Commerce, Nashville, TN.
5. Esfandi A, Rahimabadi AM. Mobile agent security in multi agent environments using a multi agent-multi key approach. In: 2009 2nd IEEE International Conference on Computer Science and Information Technology. Beijing, China: IEEE; 2009. https://doi.org/10.1109/ICCSIT.2009.5234537