{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
N.  Bartolini, Ciavarella, S., Silvestri, S., and Porta, T. L., ?On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment?, IEEE Transactions on Mobile Computing, vol. 15, pp. 3114-3128, 2016.\par \par N.  Bartolini, Bongiovanni, G., La Porta, T. F., and Silvestri, S., ?On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment?, IEEE Transactions on Mobile Computing, vol. 13, pp. 2592-2605, 2014.\par \par N.  Bartolini, Bongiovanni, G., Porta, T. L., and Silvestri, S., ?On the security vulnerabilities of the virtual force approach to mobile sensor deployment?, in 2013 Proceedings IEEE INFOCOM, 2013.\par \par N.  Bartolini, Calamoneri, T., La Porta, T. F., and Silvestri, S., ?Autonomous Deployment of Heterogeneous Mobile Sensors?, IEEE Transactions on Mobile Computing, vol. 10, pp. 753-766, 2011.\par \par N.  Bartolini, Calamoneri, T., La Porta, T., Massini, A., and Silvestri, S., ?Autonomous deployment of heterogeneous mobile sensors?, in 2009 17th IEEE International Conference on Network Protocols, 2009.\par \par }