Biblio
“On the security vulnerabilities of the virtual force approach to mobile sensor deployment”, in 2013 Proceedings IEEE INFOCOM, 2013.
, “On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment”, IEEE Transactions on Mobile Computing, vol. 15, pp. 3114-3128, 2016.
,