“…The game is modeled in different ways depending on the use case. Examples from the literature include: advanced persistent threat games [54], [66]- [68], [71], [108], [109], [150], honeypot placement games [112]- [114], resource allocation games [38], [151], authentication games [8], distributed denial-of-service games [115], [120], situational awareness games [152], [153], moving target defense games [107], [154], and intrusion response games [10], [28], [45], [50], [72], [111], [116]- [119], [121]. These games are formulated using various models from the gametheoretic literature.…”