//-->
Detecting cyber threats through social network analysis : short survey
Lyudmyla, Kirichenko, (2017)
Predictive models in cybercrime investigation : an application of data mining techniques
Murthy, A. S. N., (2010)
Identifying and profiling key sellers in cyber carding community : AZSecure text mining system
Li, Weifeng, (2016)
Hackers don't take vacations
Smith, Gordon, (2009)
Are you ready for the audit challenges of 2010?
Smith, Gordon, (2010)
Politics in Western Europe : a comparative analysis
Smith, Gordon R., (1986)