1. Security in graphs;Brigham;Discrete Appl. Math.,2007
2. Introduction to Graph Theory;Chartrand,2005
3. Secure domination, weak roman domination and forbidden subgraphs;Cockayne;Bull. Inst. Combin. Appl.,2003
4. Secure set algorithms and complexity;Dutton;Congr. Numer.,2006
5. On a graph’s security number;Dutton;Discrete Math.,2009