1. P. Hu, H. Li, H. Fu, D. Cansever, and P. Mohapatra, “Dynamic defense strategy against advanced persistent threat with insiders,” 2015 IEEE Conference on Computer Communications (INFOCOM), IEEE (April, 2015), pp. 747–755.
2. I. V. Konnov, “Games of constraints for complex systems,” Lobachevskii Journal of Mathematics, 40, No. 5, 660–666 (2019).
3. V. Y. Reshetov, A. G. Perevozchikov, and I. A. Lesik, “A Model of overpowering a multilevel defense system by attack,” Computational Mathematics and Modeling, 27, No. 2, 254–269 (2016).
4. V. Yu. Reshetov, A. G. Perevozchikov, and I. A. Lesik, “Multi-level defense system models: overcoming by means of attacks with several phase constraints,” Moscow University Computational Mathematics and Cybernetics, 1, No. 1, 25–31 (2017).
5. V. Yu. Reshetov, A. G. Perevozchikov, and I. E. Yanochkin, “A discrete multilevel ‘defense-attack’ model with nonhomogeneous resources of the opponents,” Prikl. Matem. Informat., No. 55, 12–24 (2017).