Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior, Proc. of the 2nd Annual Workshop on Economics and Information Security (WEIS '03), 2003. ,
Network security: A decision and game-theoretic approach, 2010. ,
DOI : 10.1017/CBO9780511760778
Secure or insure?, Proceeding of the 17th international conference on World Wide Web , WWW '08, pp.209-218, 2008. ,
DOI : 10.1145/1367497.1367526
Payoffs, intensionality and abstraction in games The Many Facets of Samson Abramsky, Computation, Logic, Games, and Quantum Foundations, pp.69-82, 2013. ,
Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents, Game Theory for Networks, pp.444-458, 2012. ,
DOI : 10.1007/1-4020-8090-5_1
Games of fixed rank: a hierarchy of bimatrix games, Economic Theory, vol.57, issue.1, pp.157-173, 2005. ,
DOI : 10.1007/s00199-009-0436-2
Security games with interval uncertainty, Proc. of the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS '13) International Foundation for Autonomous Agents and Multiagent Systems, pp.231-238 ,
Computing Optimal Randomized Resource Allocations for Massive Security Games, Proc. of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS '13), pp.689-696, 2009. ,
DOI : 10.1017/CBO9780511973031.008
Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence , and uniqueness, Journal of Artificial Intelligence Research, vol.41, issue.2, pp.297-327, 2011. ,
State of web application security. http://www.ponemon.org/library/2011-cost-of-data-breach-united-states ,
Game strategies in network security, International Journal of Information Security, vol.4, issue.1-2, pp.71-86, 2005. ,
DOI : 10.1007/s10207-004-0060-x
Game theory meets network security and privacy, ACM Computing Surveys, vol.45, issue.3, pp.1-2539, 2011. ,
DOI : 10.1145/2480741.2480742