2 works on record
Securing IM and P2P applications for the enterprise
Cyber Adversary Characterization