[biblio02_1]  , , , and , “Open, closed, and mixed networks of queues with different classes of customers,” J. ACM, , no. 2, April 1975.
[biblio02_2]  and , “A methodology for analyzing the performance of authentication protocols,” ACM Trans. Information Systems Security, , no. 4, November 2002, pp. 458-491.
[biblio02_3]  and , Simulation Modeling and Techniques, 3rd ed., McGraw-Hill, New York, <year>2000</year>.
[biblio02_4]  , Simulating Computer Systems: Techniques and Tools, MIT Press, Cambridge, Mass., <year>1987</year>.
[biblio02_5]  , A Course in Simulation, Macmillan, New York, <year>1990</year> ...