1. A survey of data provenance in e‐science;Simmhan Y. L.;ACM Sigmod Record,2005
2. Towards secure provenance in the cloud: A survey;Lee B.;2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC),2015
3. Establishing evolutionary game models for CYB security information Exchange (CYBEX);Tosh D.;Journal of Computer and System Sciences,2018
4. Cyber‐threats information sharing in cloud computing: A game theoretic approach;Kamhoua C.;IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud),2015
5. Game theoretic modeling to enforce security information sharing among firms;Tosh D. K.;IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud),2015