Joint Task Force Transformation Initiative. (2015). SP 800-
53 rev. 4. Recommended Security Controls for Federal
Information Systems and Organizations. Gaithersburg.
Keyser, T. (2018). Security policy. In The Information
Governance Toolkit (S. 57-62). CRC Press.
Kordy, B., Mauw, S., Melissen, M., & Schweitzer, P.
(2010). Attack–Defense Trees and Two-Player Binary
Zero-Sum Extensive Form Games Are Equivalent. In
T. Alpcan, L. Buttyán, & J. Baras (Hrsg.), Decision and
Game Theory for Security. GameSec 2010. . Lecture
Notes in Computer Science, vol 6442. Springer. doi:
10.1007/978-3-642-17197-0_17
Kordy, B., Mauw, S., Radomorivic, S., & Schweitzer, P.
(2014). Attack–Defense Trees. Journal of Logic and
Computation, Volume 24/1, S. 55–87. Von http://
logcom.oxfordjournals.org/cgi/reprint/exs029?
Kwiatkowska, M. (2016). Model Checking and Strategy
Synthesis for Stochastic Games: From Theory to
Practice. Proceedings of the 43rd International
Colloquium on Automata, Languages, and
Programming (ICALP'16). Schloss Dagstuhl - Leibniz-
Zentrum fuer Informatik.
Kwiatkowska, M., Norman, G., & Parker, D. (2019).
Verication and Control of Turn-Based Probabilistic
Real-Time Games. The Art of Modelling
Computational Systems: A Journey from Logic and
Concurrency to Security and Privacy, volume 11760 of
LNCS, S. 379-396.
Kwiatkowska, M., Parker, D., & Wiltsche, C. (4 2018).
PRISM-games: Verification and Strategy Synthesis for
Stochastic Multi-player Games with Multiple
Objectives. International Journal on Software Tools for
Technology Transfer, 20(2), S. 195–210.
Li, T., Peng, G., Zhu, Q., & Basar, T. (2021). The
Confluence of Networks, Games and Learning - A
game-theoretic framework for multi-agent decision
making over networks. IEEE control system magazine,
special issue on Distributed Nash Equilibrium Seeking
over Networks.
Luh, R., Temper, M., Tjoa, S., Schrittwieser, S., & Janicke,
H. (2019). PenQuest: a gamified attacker/defender
metamodel for cyber security assessment and
education. Journal of Computer Virology and Hacking
Techniques. doi: https://doi.org/10.1007/s11416-019-
00342-x
Luo, Y., Szidarovszky, F., Al-Nashif, Y., & Hariri, S.
(2010). Game Theory Based Network Security. Journal
of Information Security 1/1, S. 41-44. doi:
10.4236/jis.2010.11005
McCabe, J. D. (2007). Network Analysis, Architecture, and
Design. Morgan Kaufmann.
MITRE Corporation. (A). CAPEC—Common Attack
Pattern Enumeration and Classification.
https://capec.mitre.org/
MITRE Corporation. (B). MITRE ATT&CK.
https://attack.mitre.org/
MITRE Corporation. (C). MITRE D3FEND.
https://d3fend.mitre.org/resources/D3FEND.pdf
MITRE Corporation. (D). STIX—Structured Threat
Information Expression | STIX Project Documentation.
https://oasis-open.github.io/cti-documentation/
Nanda, M., & Jeppu, Y. (2018). Formal Methods for Safety
and Security. Springer.
Nguyen, K. C., Alpcan, T., & Başar, T. (2009). Stochastic
games for security in networks with interdependent
nodes. Proceedings of the 2009 International
Conference on Game Theory for Networks, GameNets
’09.
Pekergin, N., Tan, S., & Fourneau, J.-M. (2016).
Quantitative Attack Tree Analysis: Stochastic Bounds
and Numerical Analysis. International Workshop on
Graphical Models for Security, GraMSec 2016. doi:
DOI: 10.1007/978-3-319-46263-9_8
PRISM-games.
https://www.prismmodelchecker.org/games/
Sajjan, S., Sankardas, R., & Dipankar, D. (2010). Game
theory for cyber security. CSIIRW '10: Proceedings of
the Sixth Annual Workshop on Cyber Security and
Information Intelligence Research. doi: doi.org/
10.1145/1852666.1852704
Sallhammar, K., Helvik, B. E., & Knapskog, S. J. (2006).
On stochastic modeling for integrated security and
dependability evaluation. Journal of Networks 1/5, S.
31-42. doi: 10.4304/jnw.1.5.31-42
Shapley, L. S. (1953). Stochastic games. PNAS 39/10, S.
1095-1100.
Shostack, A. (2014). Threat Modeling: Designing for
Security. Wiley.
Simaitis, A. (2013). Automatic Verification of Competitive
Stochastic Systems. Dissertation. University of Oxford.
Svorenova, M., & Kwiatkowska, M. (2016). Quantitative
Verification and Strategy Synthesis for Stochastic
Games. European Journal of Control 30, special issue
15th European Control Conference, ECC16, S. 15-30.
doi: doi.org/10.1016/j.ejcon.2016.04.009
Swiderski, F., & Snyder, W. (2004). Threat Modeling.
Microsoft Press.
Tabatabaei, M. (2016). Games and Strategies in Analysis of
Security Properties. Dissertation. Université du
Luxembourg.
Tarandach, I., & Coles, M. J. (2020). Threat Modeling: A
Practical Guide for Development Teams. O'Reilly.
Wideł, W., Audinot, M., Fila, B., & Pinchinat, S. (2019).
Beyond 2014: Formal Methods for Attack tree-based
Security Modeling. ACM Computing Surveys. 52/4,
Article 75. doi: https://doi.org/10.1145/3331524
Wiltsche, C. (2015). Assume-Guarantee Strategy Synthesis
for Stochastic Games. Dissertation. University of
Oxford.
Zhang, J., Wang, Y., & Zhuang, J. (2021). Modeling multi-
target defender-attacker games with quantal response
attack strategies. Reliability Engineering & System
Safety, Volume 205.