1. Bodmer, S., Kilger, D. M., Carpenter, G., Jones, J., and Jones, J.Reverse deception: organized cyber threat counter-exploitation.McGraw-Hill New York, 2012.
2. Carroll, T. E., and Grosu, D. A game theoretic investigation of deception in network security.Security and Commun. Nets. 4, 10 (2011), 1162--1172.
3. Casey, W., Murales, J. A., Wright, E., Zhu, Q., and Mishra, B. Compliance signaling games: toward modeling the deterrence of insider threats.Computational and Mathematical Organization Theory 22, 3 (2016), 318--349.
4. Casey, W. A., Zhu, Q., Murales, J. A., and Mishra, B. Compliance control: Managed vulnerability surface in social-technological systems via signaling games. InProceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats(2015), ACM, pp. 53--62.
5. Chen, J., Touati, C., and Zhu, Q. A dynamic game analysis and design of infrastructure network protection and recovery.ACM SIGMETRICS Performance Evaluation Review 45, 2 (2017), 128.