A. Acquisti and J. Grossklags, Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior, Proc. of the 2nd Annual Workshop on Economics and Information Security (WEIS '03), 2003.

T. Alpcan and T. Ba¸sarba¸sar, Network security: A decision and game-theoretic approach, 2010.
DOI : 10.1017/CBO9780511760778

J. Grossklags, N. Christin, and J. Chuang, Secure or insure?, Proceeding of the 17th international conference on World Wide Web , WWW '08, pp.209-218, 2008.
DOI : 10.1145/1367497.1367526

C. Hankin and P. Malacaria, Payoffs, intensionality and abstraction in games The Many Facets of Samson Abramsky, Computation, Logic, Games, and Quantum Foundations, pp.69-82, 2013.

B. Johnson, J. Grossklags, N. Christin, and J. Chuang, Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents, Game Theory for Networks, pp.444-458, 2012.
DOI : 10.1007/1-4020-8090-5_1

R. Kannan and T. Theobald, Games of fixed rank: a hierarchy of bimatrix games, Economic Theory, vol.57, issue.1, pp.157-173, 2005.
DOI : 10.1007/s00199-009-0436-2

C. Kiekintveld, T. Islam, and V. Kreinovich, Security games with interval uncertainty, Proc. of the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS '13) International Foundation for Autonomous Agents and Multiagent Systems, pp.231-238

C. Kiekintveld, M. Jain, J. Tsai, J. Pita, F. Ordóñez et al., Computing Optimal Randomized Resource Allocations for Massive Security Games, Proc. of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS '13), pp.689-696, 2009.
DOI : 10.1017/CBO9780511973031.008

D. Korzhyk, Z. Yin, C. Kiekintveld, V. Conitzer, and M. Tambe, Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence , and uniqueness, Journal of Artificial Intelligence Research, vol.41, issue.2, pp.297-327, 2011.

P. Institute and L. , State of web application security. http://www.ponemon.org/library/2011-cost-of-data-breach-united-states

K. W. Lye and J. M. Wing, Game strategies in network security, International Journal of Information Security, vol.4, issue.1-2, pp.71-86, 2005.
DOI : 10.1007/s10207-004-0060-x

M. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J. Hubaux, Game theory meets network security and privacy, ACM Computing Surveys, vol.45, issue.3, pp.1-2539, 2011.
DOI : 10.1145/2480741.2480742