1. Virtual defense;Adams;Foreign Affairs,2001
2. R. Adkins, An insurance style model for determining the appropriate investment level against maximum loss arising from an information security breach, in: Third Annual Workshop on Economics and Information Security (WEIS04), University of Minnesota Digital Technology Center, University of Minnesota, MN, 2004, pp. 1–18.
3. Economics of software vulnerability disclosure;Arora;IEEE Security and Privacy,2005
4. Autonomic-computing approach to secure knowledge management;Arora;IEEE Transaction on Systems, Man, and Cybernetics, Part A,2006
5. G. Bakos, Honeypots in the enterprise – intelligence based risk management, in: New York State Cyber Security Conference, Institute for Security Technology Studies, Dartmouth College, Albany, NY, 2004, pp. 1–98.