Handling vulnerabilities with mobile agents in order to consider the delay and disruption tolerant characteristic of military networks | IEEE Conference Publication | IEEE Xplore