1. Strategically-motivated advanced persistent threat: definition, process, tactics and a disinformation model of counterattack;Ahmad;Comput. Secur.,2019
2. On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge;Ahrend;Cyber Situat. Aware. Data Anal. Assess. (CyberSA),2016
3. Enterprise information security strategies;Anderson;Comput. Secur.,2008
4. Security Engineering: A Guide to Building Dependable Distributed Systems (2nd ed.);Anderson,2008
5. Boards of directors and technology governance: the surprising state of the practice;Andriole;Commun. Assoc. Inf. Syst.,2009