1. Mohammed H Almeshekah and Eugene H Spafford. 2014. Planning and Integrating Deception into Computer Security Defenses. In Proceedings of the 2014 New Security Paradigms Workshop. ACM, Victoria, BC, Canada, 127--138.
2. Gustavo Andrade, Geber Ramalho, AS Gomes, and Vincent Corruble. 2006. Dynamic Game Balancing: An Evaluation of User Satisfaction. In Second Artificial Intelligence and Interactive Digital Entertainment Conference. AAAI, Marina del Rey, CA, 3--8. http://www.aaai.org/Papers/AIIDE/2006/AIIDE06-005.pdf
3. Michael Bachmann. 2010. The Risk Propensity and Rationality of Computer Hackers. International Journal of Cyber Criminology 4, 1&2 (2010), 643--656. http://www.cybercrimejournal.com
4. Nathan Backman. 2016. Facilitating a Battle Between Hackers: Computer Security Outside of the Classroom. In Proceedings of the 47th ACM Technical Symposium on Computing Science Education. ACM, Memphis, TN, 603--608.
5. Bob Blakely. 2015. Cloud Identity Summit - Keynote Speech. www.youtube.com/watch?v=ApKCZ-f1wbA