Rare events analysis by Monte Carlo techniques in static models, Rare Event Simulation using Monte Carlo Methods, pp.145-170, 2009. ,
DOI : 10.1002/9780470745403.ch7
URL : https://hal.archives-ouvertes.fr/hal-00787661
Game Theory, 1991. ,
How bad are selfish investments in network security?, IEEE/ACM Transactions on Networking, vol.19, issue.2, pp.549-560, 2011. ,
DOI : 10.1109/tnet.2010.2071397
URL : http://nma.berkeley.edu/ark:/28722/bk000469p03
Interplay between security providers, consumers, and attackers: a weighted congestion game approach, GameSecSecond International Conference on Decision and Game Theory for Security, pp.67-86, 2011. ,
Of threats and costs: a game-theoretic approach to security risk management. In Performance Models and Risk Management in Communication Systems, pp.33-54, 2011. ,
A Course in Game theory, 1994. ,
Existence and uniqueness of equilibrium points for concave n-person games, Econometrica, vol.33, pp.520-534, 1965. ,
State-of-the art in performance modeling and simulation, 1998. ,
, Wireless ATM and Ad-Hoc Networks: Protocols and Architectures, 1997.
System reliability and free riding, Economics of Information Security, pp.1-15, 2004. ,