Security Games with Incomplete Information
 Ulrich Berger. Fictitious play in 2×n games , 2005, J. Econ. Theory.
 T. Başar,et al. An Intrusion Detection Game with Limited Observations , 2005 .
 T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
 T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
 T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
 Jeff S. Shamma,et al. Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria , 2005, IEEE Transactions on Automatic Control.
 Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
 Andrew McLennan,et al. Gambit: Software Tools for Game Theory , 2006 .
 Jeff S. Shamma,et al. Unified convergence proofs of continuous-time fictitious play , 2004, IEEE Transactions on Automatic Control.
 K. Miyasawa. ON THE CONVERGENCE OF THE LEARNING PROCESS IN A 2 X 2 NON-ZERO-SUM TWO-PERSON GAME , 1961 .
 J. Robinson. AN ITERATIVE METHOD OF SOLVING A GAME , 1951, Classics in Game Theory.