[1] 张维迎.博弈论与信息经济学[M].上海:格致出版社, 2012.
[2] 朱·弗登博格,让·梯若尔.博弈论[M].黄涛,译.北京:中国人民大学出版社, 2010.
[3] 姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报, 2009, 32(4): 817-827.
[4] 程代展,刘挺,王元华.博弈论中的矩阵方法[J].系统科学与数学, 2014, 34(11): 1291-1305.
[5] MONDERER D, SHAPLEY L S. Potential games[J]. Games and Economic Behavior, 1996, 14(1): 124-143.
[6] DONG C Y, WANG Y L, ALDWEESH A, et al. Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM Press, 2017:211-227.
[7] MASCHLER M, SOLAN E, ZAMIR S. Game theory[M]. Cambridge: Cambridge University Press, 2009.
[8] ROSENTHAL R W. A class of games possessing pure-strategy Nash equilibria[J]. International Journal of Game Theory, 1973, 2(1): 65-67.
[9] VOORNEVELD M. Best-response potential games[J]. Economics Letters, 2000, 66(3): 289-295.
[10] WEAVER W W, KREIN P T. Game-theoretic control of small-scale power systems[J]. IEEE Transactions on Power Delivery, 2009, 24(3): 1560-1567.