[McCain 2006] Roger A. McCain, “Game theory a non-technical introduction to the analysis of strategy”, World Scientific Publishing Co. Pte. Ltd, 5 Toh Tuck Link, Singapore 596224, pp12-28.
[Buike 1999] Buike, D., “Towards a game theory model of information warfare.
Technical report”, Airforce Institute of Technology, 1999.
[Nash 1951]John Nash, “Non-Cooperative Games”, Annals of Mathematics, Vol. 54, No. 2, pp. 286-295, Sep. 1951.
[Hillier 2002] Hillier, S. and Lieberman, J., “Introduction to Operations Research”, Engineering, McGraw-Hill, 2002
[Lu 2007] Shi Jin, Lu Yin and Xie Li, “Game Theory Based Optimization of Security
Configuration”, Computational Intelligence and Security, pp. 799-803, 2007.
[Usher 1989] Dan Usher, ”The Dynastic Cycle and the Stationary State”, The American Economic Review, American Economic Association, Nashvile, TN, USA , Vol. 79, No. 5, Dec. 1989, pp. 1031-1044.
[Grossman 1991] Herschell I. Grossman, “A General Equilibrium Model of Insurrections”, The American Economic Review, Vol. 81 No. 4, Sep. 1991, pp. 912-921.
[Shi 2008] Pan Shi and Yifeng Lian, “Game-Theoretical Effectiveness Evaluation of
DDoS Defense”, etworking, pp. 427-433, 2008.
[Lye 2002] Lye K. and Wing, J. “Game strategies in network security“, in Foundations of Computer Security Workshop in FLoC'02, Copenhagen, Denmark, July 2002.
[Wang 2005] Ying-Mei Wang, Zeng-Liang Liu, Xiang-Yun Cheng and Ke-Jun Zhang,
“An analysis approach for multi-stage network attacks”, Machine Learning and ybernetics, Vol. 7, pp. 394 -3954, 2005.
[You 2003] Xia Zheng You and Zhang Shiyong, “A kind of network security behavior
model based on game theory”, Parallel and Distributed Computing, pp. 27-29,
2003
[Tidwell 2001] Tidwell, T., Larson, R., Fitch, K. and Hale, J., “Modeling Internet
Attacks“, In Proceedings of the 2001 IEEE Workshop on Information
Assurance and Security, pp. 54-59, 2001.
[黃振展2016] 黃振展, “多人賽局理論應用於網路攻防”, 碩士論文, 資訊工程系, 大同大學, Jan. 2016, pp. 5-10.[樊沁萍 1998] 樊沁萍, “君主制度之均衡課稅行為-- 賽局理論分析”, 東吳經濟商學學報, 經濟系, 東吳大學, Vol. 23, Nov. 1998, pp. 307-921.[鍾承平2005] 鍾承平, “多人多目標模糊賽局數學模式之建立”, 碩士論文, 工業工程與管理學系, 義守大學大, Jun. 2005, pp. 1-3.[楊木貴 2007] 楊木貴, “基於企圖取得管理權限之網際網路駭客行為特性模式的決策樹分析”, 碩士論文, 資訊管理學系, 華梵大學, Mar. 2007, pp. 1-3[黃志豪2005] 黃志豪, “一個使用模組化方式來重建多步驟攻擊情境的方法”, 碩士論文, 資訊管理系, 國立中央大學, Jun. 2005, pp. 1-4[吳金庭2016] 吳金庭, “以Snort偵測並封鎖網路異常行為之研究”, 碩士論文, 理學院網路學習學程,國立交通大學, Jan. 2016, pp. 1-2
[簡育書 2007] 簡育書, “應用賽局理論探討網路攻防的最佳化”, 碩士論文, 資訊工程系, 大同大學, Jan. 2016, pp. 3-4.