P. Samarati and S. De Capitani di Vimercati, “Data protection in outsourcing scenarios: Issues and directions,” in Proc. of ASIACCS 2010, Beijing, China, April, 2010.
R. Nix and M. Kantarcioglu, “Efficient Query Verification on Outsourced Data: A Game-Theoretic Approach,” CoRR abs/1202.1567, 2012.
“Handbook on Securing Cyber-Physical Critical Infrastructure,” DOI: 10.1016/B978-0-12-415815-3.00027-3 677- 2012, Elsevier Inc, 2012.
M. Ghayoori Sales, M. Haghjoo, K. Salmani, “Completeness Auditing of Continuous Query Results”, Journal of Passive Defence Science and Technology, vol.2, pp. 217_230, 2011. In persian
M. Ghayoori Sales, M. Haghjoo, K. Salmani, “Detecting Integrity Attacks to a Data Stream Management System”, Journal of Passive Defence Science and Technology, vol.2, pp. 70-75, 2011. In persian
GH.Abdoli, “Game Theory and its Applications”, SID Publications, Tehran, vol.2 , 2009. In persian
B. Padmavathi and A. R. Pathak, “Survey of Confidentiality and Integrity in Outsourced Databases,” International Journal of Scientific Engineering and Technology, Volume 2 Issue 3, pp. 122-128, 2013.
Q. Zheng, S. Xu, and G. Ateniese, “Efficient query integrity for outsourced dynamic databases,” CCSW, pp. 71-82, 2012.
D. T. Khanh, “Security Protocols for Outsourcing Database Services,” Information & Security: An International Journal, ProCon Ltd., Sofia, ISSN 1311-1493, vol. 18, 2005.
S. Papadopoulos, D. Papadias, W. Cheng, and K.-L. Tan, “Separating Authentication from Query Execution in Outsourced Databases,” Proc. IEEE 25th Int'l Conf. Data Eng. (ICDE), 2009.
R. Popa, J. Lorch, D. Molnar, H. Wang, and L. Zhuang, “Enabling Security in cloud storage SLAs with Cloud Proof,” in Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference, Ser. USENIXATC’11, pp. 31–31, 2011.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in INFOCOM, pp. 1–9, 2010.
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. Yau, “Efficient provable data possession for hybrid clouds,” in Proceedings of the 17th ACM Conference on Computer and Communications Security, ser. CCS 10, pp. 756–758, 2010.
J. Yang, H. Wang, J. Wang, C. Tan, and D. Yu, “Provable data possession of resource-constrained mobile devices in cloud computing,” JNW, vol. 6, no. 7, pp. 1033–1040, 2011.
M. Hassan, B. Song, and E.-N. Huh, “Distributed resource allocation games in horizontal dynamic cloud federation platform,” in Proceedings of the 13th International Conference on High Performance Computing and Communications (HPCC), pp. 822–827, 2011.
X. Zheng, P. Martin, W. Powley, and K. Brohman, “Applying bargaining game theory to web services negotiation,” in 2010 IEEE International Conference on Services Computing (SCC), pp. 218–225, 2010.
A. Gueye and V. Marbukh, “A game-theoretic framework for network security vulnerability assessment and mitigation,” in Decision and Game Theory for Security, pp. 186–200, 2012.
T. Alpcan and T. Basar, “Network Security: A Decision and Game-Theoretic Approach,” Cambridge University Press, 2010.
M. H. Manshai, Q. Zhu, T. Alpcan, T. Basar, and J. Hubaux, “Game theory meets network security and privacy,” ACM Trans. Comput. Logic, vol. 5, pp. 1–35, 2010.
K.-w. Lye and J. M. Wing, “Game strategies in network security,” Int. J. Inf. Sec., vol. 4, pp. 71– 86, 2005.
M.Felegyhazi and J. P. Hubaux, “Game Theory in Wireless Networks: A Tutorial,” In EPFL technical report, LCA-REPORT-2006.
L. Chen and J. Leneutre, “A game theoretical framework on intrusion detection in heterogeneous networks,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 2, pp. 165–178, 2009.
Z. Ismail, C. Kiennert, J. Leneutre, and L. Chen,” Auditing a Cloud Provider’s Compliance with Data Backup Requirements: A Game Theoretical Analysis,” IEEE Transactions on Information Forensics and Security, pp. 155-170, 2016.
B. Djebaili, C. Kiennert, J. Leneutre, and L. Chen, “Data integrity and availability verification game in untrusted cloud storage,” in Proceedings of the 5th International Conference on Decision and Game Theory for Security (GameSec), pp. 287–306, 2014.
V. Pham, MHR. Khouzani, and C. Cid, “Optimal Contracts for Outsourced Computation,” pp. 1-20, 2014.
B. Djebaili, C. Kiennert, J. Leneutre, and L. Chen, “Data Integrity and Availability Verification Game in Untrusted Cloud Storage,” GameSec, pp. 287-306, 2014.
R. Nix and M. Kantarcioglu, “Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing,” GameSec, pp. 296-308, 2012.