M. H. Almeshekah, C. N. Gutierrez, M. J. Atallah, and E. H. Spafford, Ersatzpasswords: Ending password cracking and detecting password leakage, pp.311-320, 2015.

M. H. Almeshekah and E. H. Spafford, Planning and Integrating Deception into Computer, Proceedings of the New Security Paradigms Workshop, 2014.

P. G. Bennett and M. R. Dando, Complex Strategic Analysis: A Hypergame Study of the Fall of France, Journal of the Operational Research Society, vol.30, issue.1, pp.23-32, 1979.

P. G. Bennett, Toward A Theory of Hypergames, Omega, vol.5, issue.6, pp.749-751, 1977.

L. Brumley, HYPANT : A Hypergame Analysis Tool Monash University, 2003.

N. Fraser and K. Hipel, Conflict analysis: Models and Resolutions. North-Holland series in system science and engineering, 1984.

A. Gibson, Applied Hypergame Theory for Network Defense

Y. Imamverdiyev, A Hypergame Model for Information Security, International Journal of Information Security Science, vol.3, issue.1, pp.148-155, 2014.

A. Juels and R. L. Rivest, Honeywords: Making Password-cracking Detectable, Proceedings of Computer & Communications Security, p.13, 2013.

R. Píbil, V. Lis´ylis´y, C. Kiekintveld, B. Bo?ansk´bo?ansk´y, and M. P?chou?ek, Game theoretic model of strategic honeypot selection in computer networks, Proceedings of GameSec, pp.201-220, 2012.

A. Singh and Z. Bu, Hot Knives Through Butter: Evading File-based Sandboxes. FireEye, 2014.

L. Spitzner, Honeypots: Tracking Hackers, 2002.

M. A. Takahashi, N. M. Fraser, and K. W. Hipel, A Procedure for Analyzing Hypergames, European Journal of Operational Research, vol.18, pp.111-122, 1984.

, , pp.90268-90274

M. Wang, K. W. Hipel, and N. M. Fraser, Modeling Misperceptions in Games, Behavioral Science, vol.33, issue.3, pp.207-223, 1988.

J. Yuill, M. Zappe, D. Denning, and F. Feer, Honeyfiles: deceptive files for intrusion detection, IEEE SMC Information Assurance Workshop, pp.116-122, 2004.