4Lye K, Wing J M. Game strategies in network security[J]. International Journal of Information Security, 2005, 4(1-2): 71-86.
5Wilson A G, Wilson G D, Olwell D H. Combining game theory and risk analysis in counterterrorism: A smallpox example[M]. New York: Springer, 2006.
6Arce D G, Sandler T. Counterterrorism -- A game-theoretic analysis[J]. Journal of Conflict Resolution, 2005, 49(2): 183-200.
7Hausken K. Probabilistic risk analys~ and game theory[J]. Risk Analysis, 2002, 22(1): 17-27.
8Mohi M, Movaghar A, Zadeh P M. A Bayesian game approach for preventing DoS attacks in wireless sensor networks[C]//WRI International Conference on Communications and Mobile Computing, CMC '09. 2009: 507- 511.
9Jr. Cox L A T. Game theory and risk analysis[J]. Risk Analysis, 2009, 29(8): 1062-1068.
10Seo F, Sakawa M. A game theoretic approach with risk assessment for international conflict solving[J]. IEEE Transactions on Systems, Man, and Cybernetics, 1990, 20(1): 141-148.