1. Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., and Lee, H.-J., An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor networks-based applications, MDPI Sens., 2014, vol. 14, no. 2, pp. 2732–2755.
2. Sridhar, P., Sheikh-Bahaei, S., Xia, S., and Jamshidi, Mo., Multi agent simulation using discrete event and softcomputing methodologies, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2003, vol. 2, pp. 1711–1716.
3. Page, J., Zaslavsky, A., and Indrawan, M., Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities, Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), 2004, pp. 85–101.
4. Zikratov, I.A., Kozlova, E.V., and Zikratova, T.V., Analysis of vulnerabilities of robotic complexes with swarm intelligence, Nauchno-Tekh. Vestn. Inf. Tekhnol. Mekh. Opt., 2013, no. 5 (87), pp. 149–154.
5. Zikratov, I., Lebedev, I., and Gurtov, A., Trust and reputation mechanisms for multi-agent robotic systems, Lect. Notes Comput. Sci., 2014, vol. 8638, pp. 106–120.