(1)
Shi, Z. R.; Schlenker, A.; Hay, B.; Bittleston, D.; Gao, S.; Peterson, E.; Trezza, J.; Fang, F. Draining the Water Hole: Mitigating Social Engineering Attacks With CyberTWEAK. AAAI 2020, 34, 13363-13368.