4Gao X, Zhong W J, Mei S E. A game-theory approach to configuration of detection software with decision[J]. Reliability Engineering and System Safety, 2013, 119: 35-43.
5Cavusoglu H, Raghunathan S. Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems[J]. Information Systems Research, 2009, 20(2): 198-217.
6Amin S, Schwartz G A, Sastry S S. Security of interdependent and identical networked control systems[J]. Automatica, 2013, 49(1): 186-192.
7Shetty N, Schwartz G, Walrand J. Can competitive insurers improve network security[C]//Trust and Trustworthy Computing, Berlin: Springer-Verlag, 2010: 308-322.
8Kunreuther H, Heal G. Interdependent security[J]. Journal of Risk and Uncertainty, 2003, 26(2-3): 231-249.
9Garcia A, Horowitz B. The potential for underinvestment in internet security: Implications for regulatory pol- icy[J]. Journal of Regulatory Economics, 2007, 31: 37-55.
10Zhuang J, Bier V MI Gupta A. Subsidies in interdependent security with heterogeneous discount rates[J]. The Engineering Economist, 2007, 52(1): 1-19.