1. Kephart, J., Sorkin, G., Chess, D. & White, S. Sci. Am. 88–93 (Nov. 1997).
2. Mickens, J. W. & Noble, B. D. Proc. ACM Workshop Wireless Security 77–86 (ACM, New York, 2005).
3. Su, J. et al. Proc. 4th ACM Workshop Rapid Malcode 9–16 (ACM, New York, 2006).
4. Cheng, J., Wong, S., Yang, H. & Lu, S. Proc. 5th ACM Int. Conf. Mob. Syst. Appl. Serv. (ACM, New York, 2007).
5. Nekovee, M. New J. Phys. 9, 189 (2007).