1. O’Connor, S., Hasshu, S., Bielby, J., Colreavy-Donnelly, S., Kuhn, S., Caraffini, F. and Smith, R., 2021. Scips: A serious game using a guidance mechanic to scaffold effective training for cyber security,
Information Sciences, 580, 524-540 DOI:
https://doi.org/10.1016/j.ins.2021.08.098.
2. Chronopoulos, M., Panaousis, E. and Grossklags, J., 2017. An options approach to cybersecurity investment,
IEEE Access, 6, pp. 12175 – 12186 DOI:
10.1109/ACCESS.2017.2773366
3. Whaiduzzaman, M. and Gani, A., 2013, Measuring security for cloud service provider: A third party approach, in
2013 International Conference on Electrical Information and Communication Technology (EICT), pp. 1-6. IEEE. DOI:
1109/EICT.2014.6777855
4. Che, J., Duan, Y., Zhang, T. and Fan, J., 2011. Study on the security models and strategies of cloud computing,
Procedia Engineering, 23, pp. 586-593 DOI:
https://doi.org/10.1016/j.proeng.2011.11.2551.
5. Hsieh, C., Chang, Y. and Wu, C., 2014. Competitive pricing and ordering decisions in a multiple-channel supply chain,
International journal of production economics, 154, pp. 156-165 DOI:
https://doi.org/10.1016/j.ijpe.2014.04.024.
6. Chen, Z., Wu, S., Govindan, K., Wang, J., Chin, K. and Martíınez, L., 2022, Optimal pricing decision in a multi-channel supply chain with a revenue-sharing contract,
Annals of Operations Research, 318, pp. 67-102, DOI:
https://doi.org/10.1007/s10479-022-04748-7.
7. Bartholomae, F., 2018, Cybercrime and cloud computing. A game theoretic network model,
Managerial and Decision Economics, 39, pp. 297-305, DOI:
https://doi.org/10.1002/mde.2904.
9. Cong, P., Li, L., Zhou, J., Cao, K., Wei, T., Chen, M. and HU., S, 2018, Profit-driven dynamic cloud pricing for multiserver systems considering user perceived value,
IEEE Trans. Parallel Distrib. Syst, 29, pp. 2742-2756, DOI:
10.1109/TPDS.2018.2843343.
10. Chng, S., Lu, H.Y., Kumar, A. and Yau, D., 2022, Hacker types, motivations and strategies: A comprehensive framework,
Computers in Human Behavior Reports, 5, pp. 100167, DOI:
https://doi.org/10.1016/j.chbr.2022.100167
12. Cohen, D., Elalouf, A. and Zeev, R., 2022, Collaboration or separation maximizing the partnership between a “gray hat” hacker and an organization in a two-stage cybersecurity game,
International Journal of Information Management Data Insights, 2, pp. pages 100073, DOI:
https://doi.org/10.1016/j.jjimei.2022.100073.
14. Shiva, S., Roy, S. and Dasgupta, D., 2010. Game theory for cyber security, in
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1-4, [In Persian] DOI:
https://doi.org/10.1145/1852666.1852704,
15. Do, C., Tran, N., Hong, C., Kamhoua, C.A., Kwiat, K.A., Blasch, E. and Lyengar., S., 2017. Game theory for cyber security and privacy,
ACM Computing Surveys (CSUR), 50, pp. 1-37, DOI:
https://doi.org/10.1145/3057268.
16. Hyder, B. and Govindarasu, M., 2020. Optimization of cybersecurity investment strategies in the smart grid using game-theory, in
2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1-5, DOI:
1109/ISGT45199.2020.9087634.
17. Xiao, P. and Tang, Z., 2015, Game theory–based resource pricing model in cloud platforms,
International Journal of Communication Networks and Distributed Systems, 14, pp. 256-271, DOI:
https://doi.org/10.1504/IJCNDS.2015.068666.
18. Feng, S., Xiong, Z., Niyato, D., Wang, P., Wang, S., and Shen, S., Joint pricing and security investment in cloud security service market with user interdependency,
IEEE Transactions on Services Computing, 15, pp. 1461-1472, DOI:
10.1109/TSC.2020.2996382.
19. Ge, H., Zhao, L., Yue, D., Xie, X., Xie, L., Gorbachev, S., Corovin., I. and Ge., Y., 2024, A game theory based optimal allocation strategy for defense resources of smart grid under cyber-attack,
Information Sciences, 652, pp. 1197-1220, DOI:
https://doi.org/10.1016/j.ins.2023.119759.
20. Huang, J., Leng, M. and Parlar, M., 2021, Demand functions in decision modeling: A comprehensive survey and research directions,
Decision Sciences, 44, pp. 557-609, DOI:
https://doi.org/10.1111/deci.12021
22. Gao, X., Qiu, M., Wang, Y. and Wang, X., 2023, Information security investment with budget constraint and security information sharing in resource-sharing environments,
Journal of the Operational Research Society, 74, pp. 1520-1535, DOI:
https://doi.org/10.1080/01605682.2022.2096506 .