S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya et al., A Survey of Game Theory as Applied to Network Security, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010.
DOI : 10.1109/HICSS.2010.35

M. V. Dijk, A. Juels, A. Oprea, and R. L. Rivest, FlipIt: the game of Stealthy takeover, 2012.

H. Andersson and T. Britton, Stochastic Epidemic Models and Their Statistical Analysis, 2000.
DOI : 10.1007/978-1-4612-1158-7

W. O. Kermack and A. G. Mckendrick, A contribution to the mathematical theory of epidemics, Proceedings of the Royal Society of London. Series A, vol.115, pp.772-700, 1927.

W. O. Kermack and A. G. Mckendrick, Contributions to the Mathematical Theory of Epidemics. II. The Problem of Endemicity, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.138, issue.834, pp.55-83, 1932.
DOI : 10.1098/rspa.1932.0171

W. O. Kermack and A. G. Mckendrick, Contributions to the Mathematical Theory of Epidemics. III. Further Studies of the Problem of Endemicity, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.141, issue.843, pp.94-122, 1933.
DOI : 10.1098/rspa.1933.0106

V. Capasso and G. Serio, A generalization of the Kermack-McKendrick deterministic epidemic model, Mathematical Biosciences, vol.42, issue.1-2, pp.43-61, 1978.
DOI : 10.1016/0025-5564(78)90006-8

H. Van-der-molen, Math on malware, ISACA Journal, vol.3, pp.40-47, 2011.

M. J. Osborne and A. Rubinstein, A course in game theory, 1996.

T. Turocy, Texas a&m university School of Economics " Game Theory, CDAM Research Report Oct, 2001.

J. C. Lin, J. M. Chen, C. C. Chen, and Y. S. Chien, A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, p.7581, 2009.
DOI : 10.1109/SSIRI.2009.27

Q. Wu, S. Shiva, S. Roy, C. Ellis, and V. Datla, On modeling and simulation of game theorybased defense mechanisms against DoS and DDoS attacks, Proceedings of the 2010 Spring Simulation Multiconference. SpringSim '10, p.11598, 2010.

M. Khouzani, S. Sarkar, and E. Altman, A dynamic game solution to malware attack, 2011 Proceedings IEEE INFOCOM, pp.2138-2146, 2011.
DOI : 10.1109/INFCOM.2011.5935025

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.1055

M. Saudi, E. Tamil, S. Nor, M. Idris, and K. Seman, Edowa worm classification, Proceedings of the World Congress on Engineering, 2008.
DOI : 10.1007/978-90-481-2311-7_24

D. Moore, C. Shannon, and J. Brown, Code-Red, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, pp.273-284, 2002.
DOI : 10.1145/637201.637244

M. Vojnovic and A. Ganesh, On the Race of Worms, Alerts, and Patches, IEEE/ACM Transactions on Networking, vol.16, issue.5, pp.1066-1079, 2008.
DOI : 10.1109/TNET.2007.909678