1. Tardo, J., and Valente, L. (2002). COMPCON’96. Technologies for the Information Superhighway Digest of Papers, IEEE.
2. Group Authentication Using Back-propagation Neural Network;Int. J. Adv. Res. Comput. Commun. Eng.,2017
3. Yao, M. (2004). A Security Architecture for Protecting Dynamic Components of Mobile Agents. [Doctoral Dissertation, Queensland University of Technology].
4. Deployment of Secure Mobile Agents for Medical Information Systems;J. Med. Syst.,2011
5. Esparza, O., Soriano, M., Muñoz, J.L., and Forné, J. (2003, January 3). A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, Kemer-Antalya Turkey.