Davin, J. and Modi, P.J. Impact of problem centralization
in distributed constraint optimization algorithms.
AAMAS International Conference. (2005).
DHS, A Roadmap for Cybersecurity Research, Technical
Report, Department of Homeland Security (DHS).
(2009).
Davin, K. Impact of problem centralization in distributed
constraint optimization algorithms. In Proceedings of
The 4th International Conference on Autonomous
Agents and Multiagent Systems AAMAS. (2005).
Dietzel, S. A resilient in-network aggregation mechanism
for VANETs based on dissemination redundancy, Ad
Hoc Networks 37, 101-109. (2016).
Fan, R. RobustGeo: A Disruption-Tolerant Geo-Routing
Protocol, 24th International Conference on Computer
Communication and Networks (ICCCN). (2015).
Freeman, L.: Centrality in social networks: Conceptual
clarification. Social Networks 1, 215–239 (1979).
Goldberg, S. Why is it taking so long to secure internet
routing? Communications of the ACM, 57(10), 56-63.
(2014).
Katz, L. A New Status Index Derived from Sociometric
Index. Psychometrika, 39-43. (1953).
Kimura, M., Saito, K., Ohara, K., and Motoda, H.:
Speeding-up node influence computation for huge
social networks. International Journal of Data Science
and Analytics 1, 1–14 (2016).
Kivelä, M. Multilayer networks, Journal of Complex
Networks, 2(3), 203-271. (2014).
Klein, M., P. Faratin, H. Sayama and Y. Bar-Yam.
Negotiating Complex Contracts. Group Decision and
Negotiation 12(2), 111 - 125. (2003).
Koschützki, D., Lehmann, K.A, Peeters, L., Richter, S.
Tenfelde-Podehl, D. and Zlotowski, O.. Centrality
indices. Network analysis. Lecture Notes in Computer
Science. 3418:16–61, (2005).
Landmark, L. Resilient internetwork routing over
heterogeneous mobile military networks, IEEE
Military Communications Conference (MILCOM),
388-394. (2015).
Li, M., Q. B. Vo and R. Kowalczyk Searching for fair
joint gains in agent-based negotiation. Autonomous
Agents and Multi-agent Systems (AAMAS-09). (2009).
Lin, H. S. and Goodman S. E. Toward a Safer and More
Secure Cyberspace, National Academies Press (2007).
Marsa-Maestre, I., Lopez-Carmona, M. A., Velasco, J. R.,
and de la Hoz, E. Effective bidding and deal
identification for negotiations in highly nonlinear
scenarios. In Proceedings of The 8th International
Conference on Autonomous Agents and Multiagent
Systems 2, 1057-1064. (2009).
Myerson, Roger B. Game theory. Harvard university
press, (2013).
Newman, M. Networks: an introduction. Oxford
University Press, (2010).
Ohara, K., Saito, K., Kimura, and M., Motoda, H.:
Resampling-based framework for estimating node
centrality of large social network. In: Proceedings of
the 17th International Conference on Discovery
Science (DS’14). pp. 228–239. LNAI 8777 (2014).
Pham, L., Teich, J., Wallenius, H., and Wallenius, J.
Multi-attribute online reverse auctions: Recent
research trends. European Journal of Operational
Research, 242(1), 1-9. (2015).
Ren, F., and Zhang, M. Bilateral single-issue negotiation
model considering nonlinear utility and time
constraint. Decision Support Systems. 60, 29-38.
(2013).
Rinaldi, S.M. Identifying, understanding and analyzing
critical infrastructures interdependencies, IEEE
Control Systems Magazine, 21(6), 11-25. (2001).
Sandholm, T., and Likhodedov, A. Automated design of
revenue-maximizing combinatorial auctions.
Operations Research, 63(5), 1000-1025. (2015).
Shao, S. Percolation of localized attack on complex
networks, New Journal of Physics, 17, 023049.
(2015).
Smith, P. Network resilience: a systematic approach, IEEE
Communications Magazine, 49(7), 88-97. (2011).
Strogatz, S. H. Exploring complex networks. Nature,
410(6825), 268-276. (2001).
Su, M.Y. A resilient routing approach for Mobile Ad Hoc
Networks, International Conference on High
Performance Computing & Simulation (HPCS).
(2015).
Wiener, H. Structural determination of paraffin boiling
points. Journal of the American Chemical Society,
69(1):17–20, (1947).
Xia, M., Stallaert, J. and A. B. Whinston. Solving the
combinatorial double auction problem. European
Journal of Operational Research 164(1), 239-251.
(2005).
Yağan, O. and Gligor, V. Analysis of complex contagions
in random multiplex networks. Physical Review E,
86(3), 036103. (2012).
Yao,Y. EDAL: An Energy-Efficient, Delay-Aware, and
Lifetime-Balancing Data Collection Protocol for
Heterogeneous Wireless Sensor Networks, in
IEEE/ACM Transactions on Networking, 23(3), 810-
823. (2015).
Younis, M. Topology management techniques for
tolerating node failures in wireless sensor networks: A
survey, Computer Networks, 58, 254-283. (2014).
Zmijewski, Reckless Driving on the Internet,
http://research.dyn.com/2009/02/the-flap-heard-around
-the-world/ .(2009).