- Terrence Walker:
Practical management of malicious insider threat - An enterprise CSIRT perspective. Inf. Secur. Tech. Rep. 13(4): 225-234 (2008) - Patricia A. H. Williams:
In a 'trusting' environment, everyone is responsible for information security. Inf. Secur. Tech. Rep. 13(4): 207-215 (2008) - Chan Yeob Yeun, Kyusuk Han, Duc-Liem Vo, Kwangjo Kim:
Secure authenticated group key agreement protocol in the MANET environment. Inf. Secur. Tech. Rep. 13(3): 158-164 (2008)