1] Arman D. and Ljiljana Trajkovic; Stuart H. Rubin; Michael H. Smith, “Mapping the Internet,” 2001.
[2] Jain, R.;Anjum, F.;Umar,A.; “A comparison of mobile agent and client-server paradigms for information retrieval tasks in virtual enterprises,” Research Challenges,2000. Proceedings. Academia/Industry Working Conference on ,2000 Page(s):209-213.
[3] E. Rosen, “Exterior gateway protocol (EGP),” RFC 896,Network Information Center , SRI int., Menlo Park, CA, Oct. 1982.
[4] V. Paxson, “End-to-End Routing Behavior in the Internet,” IEEE/ACM Transaction on Networking, vol. 5, on.5, October 1997.
[5] Bui, M.; Datta, A.K.; Flauzac, O.; Nguyen, D.T. “Randomized adaptive routing based on mobile agents,” Parallel Architectures, Algorithms, and Networks, 1999.(I-SPAN ‘99) Proceedings. Fourth International Symposium on , 1999 Page(s):380-385.
[6] Di Caro, G. and Dorigo, M. , “AntNet: Distributed Stigmergetic Control for Communications Networks,” Journal of Artificial Intelligence Research, Volume 9, pages 317-365,1998.
[7] Damir Horvat 1,3, Dragana Cvetkovic, Veljko Milutinovic, Petar Kocovic and Vlada Kovacevic “Mobile Agents and Java Mobile Agents Toolkits,” Proceeding of the HICSS-2000, Maui, Hawai’i, USA,January 2000 Page(s): 1-10.
[8] Danny B. Lange, Mitsuru Oshima, “Programming and Deploying Java Mobile Agents with Aglets,” Addison Wesley Longman, Inc.,Nov. 1998.
[9] N. M. Karnik ,and A. R. Tripathi, “Design Issues in Mobile-Agent Programming Systems,” IEEE Concurrency, July-September 1998, pp. 52-61.
[10] Jacobson, A. “Cooperation amid competition: Solving selfish internet behavior,” Computing in Science & Engineering [see also IEEE Computational Science and Engineering], Volume 5, Issue 5, Sept.-Oct. 2003 Page(s):6 – 8.
[11] Lefelhocz C., et al, "Congestion control for best-effort service: Why we need a new paradigm," IEEE Network, Vol. 10, Jan '96, pp. 10-19.
[12] http://www.study-area.net/network/network_icmp.htm.
[13] Lange, D. B. & Oshima, M., “Seven Good Reasons for Mobile Agents,” Communication of The ACM, March 1999, vol. 42, No. 3, pp.88-89, 1999.
[14] Geruti, M. G., “Mobile Agent in network-Centric Warfare,” Autonomous Decentralized Systems 2001, Proceedings 5th International Symposium, pp.243-246, 2001.
[15] Marques, P. J., Silva, L. M. & Sliva, J. G., “Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce,” In: Proceedings of the ASA/MA99 Conference, pp268-269, 1999.
[16] Corradi, A., Montanari, R. & Stefanelli, C., “Mobile Agents Protection in the Interent Enviroment,” In the 23rd Annual International Computer Software and Applications Conference, pp.80-85, 1999.
[17] G. Cabri, L. Leonardi, F. Zambonelli, “MARS: a Programmable Coordination Architectur for Mobile Agents,” IEEE Internet Computing, Volume: 4 Issue: 4, July-Aug. 2000, page(s): 26-35.
[18] 戶根勤,「完全理解 TCP/IP Network」,碩博文化股份有限公司,民國九十一年初版。
[19] 黃秀璇,「適合資料探勘或資料取得之行動代理人平台」,台灣科技大學電子工程研究所碩士論文,民國九十一年六月。[20] 陳彥旭,「降低網路異常對行動代理人路徑規劃影響」台灣科技大學電子工程研究所碩士論文,民國九十二年六月。[21] 左少雄,「行動代理人安全機制之研究」,國防管理學院國防資訊研究所碩士論文,民國九十三年六月。[22] http://www.sdpc.edu.cn/wlgl/JSZC/YJML.htm