//-->
Security protection design for deception and real system regimes : a model and analysis
Ryu, C., (2010)
On the two factors affecting information systems success in the extreme event context
Park, Insu, (2010)
Moving toward black hat research in Information Systems Security : an editorial introductin to the Special Issue
Mahmood, M. Adam, (2010)