[1]
“Strategic Modeling of Information Sharing among Data Privacy Attackers”, INF, vol. 34, no. 2, Accessed: Nov. 14, 2025. [Online]. Available: https://puffbird.ijs.si/index.php/informatica/article/view/286