V. Manzoni, F. Codecà, S. Savaresi, P. Cravini, “The Implementation of the Safespot Architecture on a Powered Two-Wheeler Vehicle”, 12th IFAC Symposium on Control in Transportation Systems, CTS 2009.
 J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Communications Surveys and Tutorials 13(4): 562-583 (2011)
 V. Balakrishnan, V. Varadharajan, and U. Tupakula, “Trust management in mobile ad hoc networks,” in Handbook of Wireless Ad hoc and Sensor Networks, Springer, 2009, pp. 473–502.
 A.V. Ratzer, L. Wells, H.M. Larsen, M. Laursen, J.F. Qvortrup, M.S. Stissing, M. Westergaard, S. Christensen, and K. Jensen, “Cpn-tools for editing, simulating, and analysing coloured petri net”, LNC, 2679, pp. 450– 462, 2003.
 C. Chen, J. Zhang, R. Cohen, P. Ho, A Trust-based Message Propagation and Evaluation Framework in VANETs, In Proc. of the 4th IFIP International Conference on Trust Management (IFIPTM2010), pp.103-110, 2010.
 M. M. Elsalih Abdelsalam Mahmoud, S. Shen, Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-hop Wireless Network, Proceedings of GLOBECOM'2010, Miami Florida, USA, 6-10 Déc. 2010, pp.1-5
 Raya, M., Papadimitratos, P., Gligory, V.D., Hubaux, J.P.: On data-centric trust establishment in ephemeral ad hoc networks. In: Proceedings of the IEEE Conference on Computer Communications. (2008) pp. 1238–1246
 D. Huang, Z. Zhou, X. Hong et M. Gerla, Establishing Email-based Social Network Trust for Vehicular Networks, IEEE Consumer Communications and Networking Conference (CCNC 2010), Jan 9 – 12, Las Vegas, Nevada 2010
 I. A. Soomro, H.B. Hasbullah, and J.lb.Ab Manan,"User requirements model for vehicular ad hoc network applications," International Symposium on Information Technology 2010 (ITSim 2010), Malaysia.
 P. Caballero-Gil, J. Molina-Gil, and C. Caballero-Gil, "Data aggregation based on fuzzy logic for VANETs," in Proc. of International Conference on Complex, Intelligent, and Software Intensive (CISIS), pp.33-40, 2011.
 T. Gazdar, A. Belghith, and A. BenSlimane, "A Cluster Based Secure Architecture for Vehicular Ad Hoc Networks," The 8th ACS/IEEE International Conference ACS/IEEE AICCSA'10, Hammamet, Tunisia, May 16-19, 2010 N.
 (Bajic, 2009) Eddy Bajic, “A Service-Based Methodology for RFID-Smart Objects Interactions in Supply Chain”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 4, No. 3, pp. 37-54, 2009.
 (McFarlane, 2003) D. McFarlane, “Product Identity and Its Impact on Discrete Event Observability”, European Control Conference ECC 2003, Cambridge, Septembre 2003.
 J. Grover, N. K. Prajapati, V. Laxmi, M. S. Gaur, “Machine Learning Approach for Multiple Misbehavior Detection in VANET”, First International Conference on Advances in Computing and Communications (ACC-2011), July. 22-24, Kochi Kerala, India, pp. 644-653, 2011.
 A. Giua, M.P. Fanti, and C. Seatzu, "Monitor design for colored Petri nets: an application to deadlock prevention in railway networks," Control Engineering Practice, Vol. 14, No. 10, pp. 1231-1247, October 2006.
 M. Bitam, "Modélisation et étude de comportement d’une ligne de communication TCP/IP, " 2005, Université Josef Fourier - Grenoble 1, juin, 2005.
 B. Brahimi, C. Aubrun, and E. Rondeau, “Modelling and simulation of scheduling policies implemented in Ethernet switch by using colored petri nets,” 11th IEEE International Conference on Emerging Technologies and Factory Automation, Czech Republic, 2006.