1. Alfalayleh, M., & Brankovic, L. (2004). An overview of security issues and techniques in mobile agents. Communications and Multimedia Security (CMS2004).
2. AnderssonC.FreemanD.JamesI.JohnstonA.LjungS. (2006). Mobile media and applications, from concept to cash. New York, NY: John Wiley & Sons, Inc.
3. Bagci, F., Schick, H., Petzold, J., Trumler, W., & Ungerer, T. (2005). Communication and security extensions for a ubiquitous mobile agent system (UbiMAS). In 2nd Conference on Computing Frontiers (CF’05) (pp. 246–251). ACM.
4. On mobile agents for autonomous logistics: an analysis of mobile agents considering the fan out and sundry strategies
5. BellifemineF. L.CaireG.GreenwoodD. (2007). Developing multi-agent systems with JADE. New York, NY: John Wiley & Sons, Inc.10.1002/9780470058411