1. Self protecting data for de-perimeterised information sharing;Burnap,2009
2. Risk management using behavior based attack graphs;Dantu,2004
3. Classification of attributes and behavior in risk management using Bayesian networks;Dantu,2007
4. Network risk management using attacker profiling;Dantu;Secur Commun Netw,2009