Jakobsson, M., Johnson, N., & Finn, P. (2008). Why and how to perform fraud experiments. IEEE Security and Privacy, 6(2), 66–68. https://doi.org/10.1109/MSP.2008.52
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.