[1]
K. Hausken, “A Strategic Analysis of Information Sharing Among Cyber Attackers”, JISTEM USP, vol. 12, no. 2, pp. 245–270, Aug. 2015.