1. An Overview of Security Issues and Techniques in Mobile Agents
2. Baskerville, P. (2006). Intrusion prevention systems: How do they prevent intrusion? Retrieved from http://eprints.otago.ac.nz/340/1/PhilBaskervilleThesis8-14MB.pdf
3. Bellavista, P., Corradi, A., Federici, C., Montanari, R., & Tibaldi, D. (2003). Security for mobile agents: Issues and challenges. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.132.2091&rep=rep1&type=pdf
4. Bellifemine, F., Poggi, A., & Rimassa, G. (1999). JADE - A FIPA-compliant agent framework. Retrieved from http://citeseerx.ist.psu.edu/ viewdoc/ download?doi=10.1. 1.86.6371&rep=rep1& type=pdf
5. Brumley, D. (2009). Mitigating C vulnerabilities. Retrieved from http://www.ece.cmu.edu/~dbrumley/courses/18732-f09/03-scribe.pdf