Aplak, H., Kabak, M. & Kose, E. (2014). A two person zero sum game oriented to integration of objectives, Journal of Military Studies, 5 (2).
Bazaraa, M.S. & Jarvis, J.J. (1997). Linear Programming and Network Flows, John Wiley & Sons, Inc., NewYork .
Bigdeli, H. & Hassanpour, H. (2016). A satisfactory strategy of multiobjective two person matrix games with fuzzy payoffs, Iranian Journal of Fuzzy Systems, 13, 17-33.
Bigdeli, H. & Hassanpour, H. (2018). Modeling and solving multiobjective security game problem using multiobjective bilevel problem and its application in metro security system, Journal of Electronical & Cyber Defence (In Persian).
Bigdeli, H., Hassanpour, H. & Tayyebi, J. (2016). The optimistic and pessimistic solutions of single and multiobjective matrix games with fuzzy payoffs and analysis of some of military problems, Defence Sci & Tech, Acceptd, (In Persian).
Bigdeli, H., Hassanpour, H. & Tayyebi, J. (2018). Constrained Bimatrix Games with Fuzzy Goals and its Application in Nuclear Negotiations.
Bigdeli, H., Hassanpour, H. & Tayyebi, J. (2018). Multiobjective security game with fuzzy payoffs, Iranian Journal of Fuzzy Systems.
Brown, G., Carlyle, M., Kline, J. & Wood, K. (2005). A Two-Sided Optimization for Theater Ballistic Missile Defense, in Operations Research, 53: 263–275.
Brown, M., An, B., Kiekintveld, C., Ordóñez, F. & Tambe M. (2014). An extended study on multi-objective security games, Auton Agent Multi-Agent Syst, 28:31–71.
Brynielsson, J. (2007). Using AI and games for decision support in command and control, Decision Support Systems, 43: 1454 –1463.
Gatti, N. (2008). Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form, in ECAI-08, pp. 403–407.
Guillarme,N. L., Mouaddib, A., Lerouvreur, X. & Gatepaille, S. (2015). A Generative Game-Theoretic Framework for Adversarial Plan Recognition, Journées Francophones sur la Planification, la Décision et l’Apprentissage.
Haywood, O. G. (1989). Military Decision and Game Theory, Wiley, Journal of the Operations Research Society of America, 2 (4): 365-385.
Kheirkhah, A. S., Navidi, H. R., & Bidgoli, M. M. (2017). Modeling and Solving the Hazmat Routing Problem under Network Interdiction with Information Asymmetry, Journal of transportation engineering, 9 (1): 17-36.
Lye, K. & Wing, J.M. (2005).Game Strategies in Network Security, International Journal of Information Security, (1–2): 71–86.
Mchugh, F.J. (1969), Fundamentals of wargaming, United states naval college.
Neumann, .JV. & Morgenstern, O. (1944). Theory of Games and Economic Behavior,Wiley, New York.
Owen, G. (1995). Game Theory, Academic Press, San Diego, Third Edition.
Sakawa, M. & Nishizaki, I. (2009). Cooperative and Noncooperative Multi-Level Programming, Springer, New York and london.
Sakawa, M. (1993). Fuzzy sets and interactive multiobjective optimization, Plenum press, New York and london.
Sandler, T. & D.G.A.M. (2003). Terrorism and Game Theory, Simulation and Gaming, 34 (3): 319–337.
Tambe, M. (2012). Security and game theory, algorithms, deployed systems, lessons learned, Cambridge university press.