[1]
. Strategic Modeling of Information Sharing among Data Privacy Attackers. Informatica. 34, 2 ().