1. Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., and Venkatasubramanian, K., Security of autonomous systems employing embedded computing and sensors, IEEE Micro, 2013, vol. 33, no. 1, pp. 80–86.
2. Gvozdev, A.V., Zikratov, I.A., Lebedev, I.S., Lapshin, S.V., and Solov’ev, I.N., The forecast of security of software architectures, Nauchno-Tekh. Vestn. Inf. Tekhnol., Mekh. Opt., 2012, no. 4 (80), pp. 126–130.
3. Mal'tsev, G.N. and Dzhumkov, V.V., The generalized model of the information transmission discrete channel with grouping of errors, Inf.-Upr. Sist., 2013, no. 1, pp. 27–33.
4. Zikratov, I., Lebedev, I., and Gurtov, A., Trust and reputation mechanisms for multi-agent robotic systems, Lect. Notes Comput. Sci., 2014, vol. 8638, pp. 106–120.
5. Prabhakar, M., Singh, J.N., and Mahadevan, G., Nash equilibrium and Marcov chains to enhance game theoretic approach for vanet security, International Conference on Advances in Computing, ICAdC 2012, Bangalore, 2013, pp. 191–199.