[1]
Hausken, K. 2015. A Strategic Analysis of Information Sharing Among Cyber Attackers. Journal of Information Systems and Technology Management. 12, 2 (Aug. 2015), 245–270. DOI:https://doi.org/10.4301/s1807-17752015000200004.