K. Lye and J. Wing, “Game Strategies in Network Secu-rity,” International Journal of Information Security, Vol. 4, 2005, pp. 71-86.
D. Shen, G. Chen, E. Blasch and G. Tadda, “Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense,” IEEE Military Communications Conference (MILCOM 2007), Orlando, 2007.
L. Carin, G. Cybenko and J. Hughes, “Cybersecurity Strategies: The QuERIES Methoddology,” Computer, Vol. 41, No. 8, 2008, pp. 20-26.
Z. Zhang and P. Ho, “Janus: A Dual-Purpose Analytical Model for Understanding, Characterizing and Counter-mining Multi-Stage Collusive Attacks in Enterprise Net-works” Journal of Network and Computer Applications, Vol. 32, No. 3, 2009, pp. 710-720.
P. Liu and W. Zang, “Incentive-Based Modeling and Inference of Attack Intent, Objectives, and Strategies,” CCS’03, Washington, DC, 2003.
W. M. Siever, A. Miller and D. R. Tauritz, “Blueprint for Iteratively Hardening Power Grids Employing Unified Power Flow Controllers,” SoSE’07, IEEE International Conference on System of Systems Engineering, Tampa, 2007.
Y. Luo, F. Szidarovszky, Y. Al-Nashif and S. Hariri, “Game Tree Based Partially Observable Stochastic Game Model for Intrusion Defense Systems (IDS),” IIE Annual Conference and Expo (IERC 2009), Miami, 2009.
F. Forgo, J. Szep and F. Szidarovszky, “Introduction to the Theory of Games,” Kluwer Academic Publishers, Dordrecht, 1999.
B. T. Richardson and L. Chavez, “National SCADA Test Bed Consequence Modeling Tool,” Sandia National La- boratory Report, SAND2008-6098, Albuquerque, 2008.
F. Szidarovszky, M. Gershon and L. Duckstein, “Tech-niques for Multiobjective Decision Making in Systems Management,” Elsevier, Amsterdam, 1986.