1. [1] R.C. Brigham, R.D. Dutton, and S.T. Hedetniemi, “Security in graphs,” Discrete Appl. Math., vol.155, pp.1708-1714, 2007.
2. [2] F.R.K. Chung, Z. Füredi, R.L. Graham, and P.D. Seymour, “On induced subgraphs of the cube,” J. Comb. Theory, Ser. A, vol.49, pp.180-187, 1988.
3. [3] R.D. Dutton, “The evolution of a hard graph theory problem — secure sets,” A course material of COT 6410: Computational Complexity, University of Central Florida, 2010. Available at http://www.cs.ucf.edu/courses/cot6410/spr2010/doc/SecureSets.doc
4. [4] R.D. Dutton, “On a graph's security number,” Discrete Math., vol.309, pp.4443-4447, 2009.
5. [5] R.D. Dutton, R. Lee, and R.C. Brigham, “Bounds on a graph's security number,” Discrete Appl. Math., vol.156, pp.695-704, 2008.