“…The game is modeled in different ways depending on the use case. Examples from the literature include: advanced persistent threat games [57], [74]- [76], [121], [122], [161], honeypot placement games [125]- [127], resource allocation games [41], [162], authentication games [8], distributed denial-of-service games [128], [133], situational awareness games [163], [164], moving target defense games [120], [165], jamming games [81], and intrusion response games [11], [31], [48], [53], [58], [79], [80], [124], [129]- [132], [134]. These games are formulated using various models from the game-theoretic literature.…”