Although a large number of results have been reported on coordination of networked MASs from various perspectives, there remains much room to explore secure coordination of networked MASs subject to various network-induced constraints and attacks simultaneously;