(1)
Hausken, K. A Strategic Analysis of Information Sharing Among Cyber Attackers. JISTEM USP 2015, 12, 245-270.