[1] Garrec, T. “Continuous Patrolling and Hiding Games”; Eur. J. Oper. Res. 2019, 277, 42-51. DOI:10.1016/j.ejor. 2019.02.026
[2] Kar, D.; Nguyen, T.H.; Fang, F.; Brown, M.; Sinha, A.; Tambe, M.; Jiang, A.X. “Trends and Applications in Stackelberg Security Games”; Handbook of dynamic game theory, 2017. 1-47.
[3] Yuan, Y.; Sun, F.; Liu, H. “Resilient Control of Cyber-physical Systems against Intelligent Attacker: a Hierarchal Stackelberg Game Approach”; Int. J. Syst. Sci. 2016, 47, 2067-2077. DOI:10.1080/00207721.2014.973467
[4] Hunt, K.; Agarwal, P.; Zhuang, J. “Technology Adoption for Airport Security: Modeling Public Disclosure and Secrecy in an Attacker-Defender Game”; Reliab. Eng. Syst. Safe 2021, 107355. DOI:10.1016/j.ress.2020.107355
[5] Sinha, A.; Fang, F.; An, B.; Kiekintveld, C; Tambe, M. “Stackelberg Security Games: Looking Beyond a Decade of Success”; Int. Joint Conf. Artificial Intelligence 2018, 1-13. DOI:10.24963/ijcai.2018/775
[6] An, B.; Tambe, M.; and Sinha, A., “Stackelberg Security Games (ssg) Basics and Application Overview”; Improving Homeland Security Decisions. 2017. 2. 485.
[7] Korzhyk, D.; Conitzer, V.; Parr, R. “Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games”; Twenty-Fourth AAAI Conf. Artificial Intelligence. 2010. 805-810.
[8] Letchford, J.; Conitzer, V. “Solving security games on graphs via marginal probabilities”; Twenty-Seventh AAAI Conf. Artificial Intelligence. 2013. 591-597. DOI:10.1609/ aaai.v27i1.8688
[9] Xu, H.; “The Mysteries of Security Games: Equilibrium Computation Becomes Combinatorial Algorithm Design”; Conf. Economics and Computation. 2016. 497-514.
[10] Han, Y.; Alpcan, T.; Chan, J.; Leckie, C. “Security Games for Virtual Machine Allocation in Cloud Computing”; 4th Int. Conf. Decision and Game Theory for Security. 2013. 99-118.
[11] Bigdeli, H.; Hassanpour H.; Tayyebi, J. “The Optimistic And Pessimistic Solutions of Single and Multiobjective Matrix Games with Fuzzy Payoffs and Analysis of Some of Military Problems”; J. Adv. Defense Sci. & Technol. 2016, 8, 133-45 (In Persian).DOR: 20.1001.1.26762935.1396.8.2.5.5
[12] Bigdeli, H.; Hassanpour, H; Tayyebi, J. “Constrained Bimatrix Games with Fuzzy Goals and Its Application in Nuclear Negotiations”; J. Numerical Anal. Optim. 2018, 8, 81-110. DOI:10.1142/S0218488523500459
[13] Toudashki, M.; Zahraee, S.; “Solving Multiobjective Security Games with Interval Payoffs”; J. Wargaming 2020, 2, 71-90. DOI:10.22034/ijwg.2020.106194
[14] Bigdeli, H.; Hassanpour, H. “Modeling and Solving Multiobjective Security Game Problem Using Multiobjective Bilevel Problem and Its Application in Metro Security System”; J. Elect. Cyber Def. 2017, 31-38 (In Persian). DOI:10.22034/ijwg.2020.106194
[15] Kheirkhah, A. S.; Navidi, H. R.; Bidgoli, M. M. “Modeling and Solving the Hazmat Routing Problem under Network Interdiction with Information Asymmetry”; J. Trans. Eng. 2017, 9, 17-36. https://dor.net/20.1001.1.20086598.1396. 9.1.1.7
[16] Gan, J. Elkind, E. Wooldridge, M. “Stackelberg Security Games With Multiple Uncoordinated Defenders”; 17th Int. Conf. Autonomous Agents and Multiagent Systems. 2018. 703-711. https://dlnext.acm.org/doi/abs/10.5555/3237383. 3237487
[17] Nguyen, T.; Xu, H. “Imitative Attacker Deception in Stackelberg Security Games”; IJCAI. 2019, 528-534. DOI:10.24963/ijcai.2019/75
[18] Esmaieli, S.; Hassanpour, H; Bigdeli, H. “Lexicographic Programming for Solving Security Game with Fuzzy Payoffs and Computing Optimal Deception Strategy”; Defensive Future Study Researches J. 2020, 5, 89-108. DOI: 10.22034/dfsr.2020.39783
[19] Bigdeli, H.; Tayyebi, J. “A Defender-Attacker Game with Intuitionistic Fuzzy Payoffs”; 14th Int. Conf. Iranian Operations Research Society 1400, 60-74.
[20] Nguyen, T.; Xu, H. “When Can the Defender Effectively Deceive Attackers in Security Games?”; Thirty-Sixth AAAI. Conf. Artificial Intelligence 2022. 9405-9412.