1. Fudenberg, D., Tirole, J.: Game theory. MIT Press (1991)
2. Jain, M., An, B., Tambe, M.: Security games applied to real-world: Research contributions and challenges. In: Moving Target Defense II, pp. 15–39. Springer (2013)
3. Jin, X., Pissinou, N., Pumpichet, S., Kamhoua, C.A., Kwiat, K.: Modeling cooperative, selfish and malicious behaviors for trajectory privacy preservation using bayesian game theory. In: Local Computer Networks (LCN), pp. 835–842. IEEE (2013)
4. Liang, X., Xiao, Y.: Game theory for network security. IEEE Communications Surveys & Tutorials 15(1), 472–486 (2013)
5. Lecture Notes in Computer Science;J. Lin,2012