Internet of things: Vision, applications and research challenges, Ad Hoc Networks, pp.1497-1516, 2012. ,
DOI : 10.1016/j.adhoc.2012.02.016
Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?, Computer, vol.43, issue.4, pp.51-56, 2010. ,
DOI : 10.1109/MC.2010.98
Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things, Proceedings of International Conference on Decision and Game Theory for Security, pp.329-348, 2016. ,
DOI : 10.1016/j.automatica.2006.03.011
Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT), 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2017. ,
DOI : 10.23919/WIOPT.2017.7959892
Social and economic networks, 2010. ,
Network design and defence, Games and Economic Behavior, vol.79, pp.30-43, 2013. ,
DOI : 10.1016/j.geb.2012.12.007
Optimal design and defense of networks under link attacks, Journal of Mathematical Economics, vol.68, pp.62-79, 2017. ,
DOI : 10.1016/j.jmateco.2016.11.006
URL : https://hal.archives-ouvertes.fr/hal-01384998
Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment, 2016 IEEE 55th Conference on Decision and Control (CDC), pp.5183-5188, 2016. ,
DOI : 10.1109/CDC.2016.7799062
Interdependent network formation games with an application to critical infrastructures, Proceedings of the American Control Conference (ACC), pp.2870-2875, 2016. ,
Zur allgemeinen Kurventheorie, Fundamenta Mathematicae, vol.10, issue.1, pp.96-115, 1927. ,
DOI : 10.4064/fm-10-1-96-115
THE MAXIMUM CONNECTIVITY OF A GRAPH, Proceedings of the National Academy of Sciences, vol.48, issue.7, p.1142, 1962. ,
DOI : 10.1073/pnas.48.7.1142
Hamilton Decomposition of Harary Graphs, International Journal of Mathematics Trends and Technology (IJMTT), vol.34, issue.2, pp.59-63, 2016. ,