Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts | Publicación