1. Agah A, Das SK (2007) Preventing DoS attacks in wireless sensor networks: A repeated game theory approach. Int J Netw Secur 5(2):145–153
2. Alpcan T, Başar T (2003) A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of the 42nd Conference on Decision and Control, Maui, HI
3. Altman E, Boulogne T, El-Azouzi R, Jiménez T, Wynter L (2006) A survey on networking games in telecommunications. Comput Oper Res. 33(2)
4. Anderegg L, Eidenbenz S (2003) Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MobiCom 2003), San Diego, CA, USA, pp 245–259
5. Bistarelli S, Dall’Aglio M, Peretti P (2006) Strategic games on defense trees. In: Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust (FAST’06), LNCS 4691, Hamilton, Ontario, Canada, pp 1–15