H. Cancela, M. E. Khadiri, and G. Rubino, Rare events analysis by Monte Carlo techniques in static models, Rare Event Simulation using Monte Carlo Methods, pp.145-170, 2009.
DOI : 10.1002/9780470745403.ch7

URL : https://hal.archives-ouvertes.fr/hal-00787661

D. Fudenberg and J. Tirole, Game Theory, 1991.

L. Jiang, V. Anantharam, and J. Walrand, How bad are selfish investments in network security?, IEEE/ACM Transactions on Networking, vol.19, issue.2, pp.549-560, 2011.
DOI : 10.1109/tnet.2010.2071397

URL : http://nma.berkeley.edu/ark:/28722/bk000469p03

P. Maillé, P. Reichl, and B. Tuffin, Interplay between security providers, consumers, and attackers: a weighted congestion game approach, GameSecSecond International Conference on Decision and Game Theory for Security, pp.67-86, 2011.

P. Maillé, P. Reichl, and B. Tuffin, Of threats and costs: a game-theoretic approach to security risk management. In Performance Models and Risk Management in Communication Systems, pp.33-54, 2011.

M. Osborne and A. Rubinstein, A Course in Game theory, 1994.

J. B. Rosen, Existence and uniqueness of equilibrium points for concave n-person games, Econometrica, vol.33, pp.520-534, 1965.

G. Rubino, State-of-the art in performance modeling and simulation, 1998.

C. K. Toh, Wireless ATM and Ad-Hoc Networks: Protocols and Architectures, 1997.

H. Varian, System reliability and free riding, Economics of Information Security, pp.1-15, 2004.