published in Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research Journal
presented at event CSIIRW '11: Cyber Security and Information Intelligence Research Workshop Conference