[1] XinyangD., Xi. Z., Xiaoyan S., Felix T.S.C., Yong H., Rehan S., Yong D. (2014) "An evidential game theory framework in multi Criteria decision-making process", Applied Mathematics and Computation, 244 (1):783–793.
[2] Yong W, Gengzhong F., Nengmin W, Huigang L. (2015) "Game of information security investment: Impact of attack types and network vulnerability", Expert Systems with Applications, 42(1): 6132–6146.
[3] Hausken K. (2008) "Strategic defense and attack for reliability systems", Reliability Engineering and System Safety, 181(1): 1740–1750.
[4] Hausken K. (2010) "Defense and attack of complex and dependent systems", Reliability Engineering and System Safety, 95(1): 29-42.
[5] Levitin G, Hausken K, Yuanshun D. (2014) "Optimal defense with variable number of overarching and individual protections", Reliability Engineering and System Safety, 123(1): 81–90.
[7] Maciejewski W. (2014) "Reproductive value in graph-structured populations", Journal of Theoretical Biology, 340(1): 285–293.
[8] Allen B., Nowak M. A. (2014) "Games on Graphs. EMS Survey", Mathematics Science, 340 (1):113–151.
[9] Nowak M. A., Tarnita C. E., Antal T. (2010) "Evolutionary dynamics in structuredpopulations", Journal of Theoretical Biology, 365(1): 19–30.
[10] Imhof L. A., Nowak M. A. (2006) "Evolutionary game dynamics in a Wright–Fisher process", Journal of Mathematical Biology, 52(5): 667–681.
[11] Hellmann T., Staudigl M. (2014) "Evolution of social networks", European Journal of Operational Research, 234(1): 583–596.
[12] Changhyun K., Terry L. F., Reetabrata M., Tao Y., Baichun. F. (2009) "Non-cooperative competition among revenue maximizing service providers with demand learning", European Journal of Operational Research, 197(1): 981–996.
[13] Gangshu C., Ned. K. (2009) "An evolutionary game theoretic perspective on e-collaboration: The collaboration effort and media relativeness", European Journal of Operational Research, 194(1): 821–833.
[14] Chyi J. L, Chung Y. T, Chayakrit. C., Ming D. (2012) "Dynamic decision-making in a two-stage supply chain with repeated transactions", International Journal of Production Economics, 137(1): 211–225.
[15] Gilberto A. S. S, Renato. A. K. , Rodrigo C. C. (2012) "A differential evolution approach for solving constrained min–max optimization problems", Expert Systems with Applications, 39(1):13440–13450.
[16] Cramer A., Sudhof S., Zivi E. (2009) "Evolutionary algorithms for minimax problems in robust design", IEEE Transactions on Evolutionary Computation, 13(1): 444–453.
[17] Yihui Q., Zhide C., Li. X. (2010) "Active defense model of wireless sensor networks based on evolutionary game theory", 6th International Conference on Wireless Communications Networking and Mobile Computing, pp.1–4.
[18] Jiang W., Fangbin X. (2009) "Evaluating network security and optimal active defense based on attack–defense game theory", Chinese Journal of Computer, 32(4): 44–53.
[19] Tullock G. (1980) "Efficient rent-seeking, In: Buchanan JM, Tollison RD, Tullock G., Editors. Toward a theory of the rent-seeking society", College Station: Texas A&M University Press, pp.97–112.
[20] Fontanini W., FerreiraP. A. V. (2014) "A game-theoretic approach for the web services scheduling problem", Expert Systems with Applications, 41(1): 4743–4751.
[21] Abdolalipour A., Nazemi J., Toloie Eshlaghi A., Hosseinzadeh Lotfi F. (2014) "Service recovery chain response time coordinating mathematical model through bilevel programming approach", Management Research in Iran, 17(2):196–222 (in Persian).
[22] Mirfakhraddiny S. A, Babaei Meybodi H., Morovati Sharifabadi A. (2013) "Predicting energy consumption of Iran via a hybrid model of artificial neural networks and genetic algorithms and comparing it with traditional models", Management Research in Iran, 18(1): 171–191 (in Persian).
[23] Konak A., Kulturel-Konak S., Lawrence V. S. (2015) "A game-theoretic genetic algorithm for the reliable server assignmentproblem under attacks", Computers & Industrial Engineering, 85(1): 73–85.
[24] Zhide C., Cheng Q., Yihui Q., Li X., Wei W. (2014) Dynamics stability in wireless sensor networks active defense model, Journal of Computer and System Sciences, 80(10): 1534–1548.
[25] Zhenyuan G., Xingfu Z. (2015) "Impact of discontinuous harvesting on fishery dynamics in a stock-effort fishing model", Journal of Communication in Nonlinear Science and Numerical Simulation, 20 (1):594–603.