Biblio
“On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment”, IEEE Transactions on Mobile Computing, vol. 15, pp. 3114-3128, 2016.
, “On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment”, IEEE Transactions on Mobile Computing, vol. 13, pp. 2592-2605, 2014.
, “On the security vulnerabilities of the virtual force approach to mobile sensor deployment”, in 2013 Proceedings IEEE INFOCOM, 2013.
, “Autonomous deployment of heterogeneous mobile sensors”, in 2009 17th IEEE International Conference on Network Protocols, 2009.
, “Autonomous Deployment of Heterogeneous Mobile Sensors”, IEEE Transactions on Mobile Computing, vol. 10, pp. 753-766, 2011.
,