L.M. Kaufman, "Can public-cloud security meet its unique challenges?", IEEE Secur. Priv., vol. 8, pp. 55-57, 2010.
C.A. Kamhoua, L. Kwiat, K.A. Kwiat, J.S. Park, M. Zhao, and M. Rodriguez, "Game theoretic modeling of security and interdependency in a public cloud In ", IEEE International Conference on Cloud Computing Anchorage, AK, 2014, pp. 514-521.
L. Chen, and J. Leneutre, "A game theoretical framework on intrusion detection in heterogeneous networks. In ", IEEE Transactions
on Information Forensics and Security,, vol. 4, pp. 165-178, 2009.
S. Saha, J. Sarkar, A. Dwivedi, N. Dwivedi, A.M. Narasimhamurthy, and R. Roy, "A novel revenue optimization model to address the operation and maintenance cost of a data center", J. Cloud Computing, vol. 5, pp. 1-23, 2016.
A. Tversky, and D. Kahneman, "Advances in prospect theory: Cumulative representation of uncertainty", J. Risk Uncertain., vol. 5, pp. 297-323, 1992.
R.D. McKelvey, and T.R. Palfrey, "Quantal response equilibria for normal form games", Games and Economic Behavior, , vol. 10, pp. 6-38, 1995.
T.H. Nguyen, R. Yang, A. Azaria, S. Kraus, and M. Tambe, ""Analyzing the effectiveness of adversary modeling in security games" In ", Proceedings of the 27th AAAI Conference on Artificial Intelligence Bellevue, Washington, 2013, pp. 718-724
Y.D. Abbasi, M. Short, A. Sinha, N. Sintov, C. Zhang, and M. Tambe, "Human adversaries in opportunistic crime security games: evaluating competing bounded rationality models In ", Proceedings of the Third Annual Conference on Advances in Cognitive Systems ACS Atlanta, Georgia, 2015, pp.2
D. Kar, F. Fang, F.D. Fave, N. Sintov, and M. Tambe, "A game of thrones: when human behavior models compete in repeated Stackelberg security games In ", Proceedings of International Conference on Autonomous Agents and Multiagent Systems Istanbul, Turkey, 2015, pp. 1381-1390.
R. Yang, F. Ordonez, and M. Tambe, "Computing optimal strategy against quantal response in security games In ", Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems Valencia, Spain, 2012, pp. 847-854.
R. Yang, C. Kiekintveld, F. Ordóñez, M. Tambe, and R. John, "Improving resource allocation strategies against human adversaries in security games: An extended study", Artif. Intell., vol. 195, pp. 440-469, 2013.
R. Yang, C. Kiekintveld, F. Ordonez, M. Tambe, and R. John, "Improving resource allocation strategy against human adversaries in security games In ", IJCAI Proceedings-International Joint Conference on Artificial Intelligence Barcelona, Catalonia, Spain, 2011, pp. 458
Y. Qian, W.B. Haskell, and M. Tambe, "Robust strategy against unknown risk-averse attackers in security games In ", Proceedings of International Conference on Autonomous Agents and Multiagent Systems Istanbul, Turkey, 2015, pp. 1341-1349.
E.A. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, and G. Meyer, "PROTECT: An application of computational game theory for the security of the ports of the United States In ", Proceedings of the 26th AAAI Conference on Artificial Intelligence Toronto, Ontario, Canada, 2012, pp. 2173-2179.
J.H. Cho, Y. Wang, I.R. Chen, K.S. Chan, and A. Swami, "A survey on modeling and optimizing multi-objective systems", IEEE Commun.
Surveys Tutorials , vol. 19, pp. 1867-1901, 2017.
Z. Fei, B. Li, S. Yang, C. Xing, H. Chen, and L. Hanzo, "A survey of multi-objective optimization in wireless sensor networks: metrics, algorithms, and open problems", IEEE Commun. Surveys Tutorials , vol. 19, pp. 550-586, 2017.
J. Cui, and R.S. John, "Empirical comparisons of descriptive multi-objective adversary models in stackelberg security games In ", 5th International Conference on Decision and Game Theory for Security Los Angeles, USA, 2014, pp. 309-318.
M. Brown, B. An, C. Kiekintveld, F. Ordóñez, and M. Tambe, "Multi-objective optimization for security games In ", Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems Valencia, Spain, 2012, pp. 863-870.
M. Jain, B. An, and M. Tambe, "Security games applied to real-world: research contributions and challenges", Moving Tar. Defense II, vol. 100, pp. 15-39, 2012.
I. Butun, M. Erol-Kantarci, and B. Kantarci, "Cloud-centric multi-level authentication as a service for secure public safety device networks", IEEE Communications Magazine, vol. 54, pp. 47-53, 2016.
L. Tawalbeh, H. Tawalbeh, and H. Song, “Intrusion and attacks over mobile networks and cloud health systems” IEEE INFOCOM., IEEE, 2017.
A. Čaušević, H. Fotouhi, and K. Lundqvist, Data security and privacy in cyber-physical systems for healthcare: foundations, principles and applications., Security and Privacy in Cyber-Physical Systems, 2017.
A. Aziz, System and method for detecting anomalous behaviors using a virtual machine environment. US Patent 9661018, 2017.
G. Kirti, R. Gupta, and K. Biswas, "“Techniques for cloud security monitoring and threat intelligence”", US Patent 15632174. 2017.,
R. Gibbons, A primer in game theory., Harvester Wheatsheaf, 1992.
B. Fischhoff, B. Goitein, and Z. Shapira, "subjective expected utility: a model of decision-making", J. Am. Soc. Inf. Sci., vol. 16, pp. 183-207, 1983.