[1] J. F. Bard, Practical Bilevel Optimization: Algorithms and Applications, Nonconvex Optimization and Its Applications (NOIA, volume 30), Springer, 1998.
[2] M. S. Bazaraa, H. D. Sherali, and C. M. Shetty, Nonlinear Programming: Theory and Algorithms, John Wiley & Sons, 3rd ed., 2006.
[3] J. F. Bonnans, J. C. Gilbert, C. Lemarechal, and C. A. Sagastiz ´ abal ´ , Numerical Optimization: Theoretical and Practical Aspects, Universitext (UTX), Springer Berlin, Heidelberg, 1998.
[4] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.
[5] S. Dempe and J. Dutta, Is bilevel programming a special case of a mathematical program with complementarity constraints?, Math. Program., 131 (2012), pp. 37–48.
[6] Q. Feng, H. Cai, and Z. Chen, Using game theory to optimize the allocation of defensive resources on a city scale to protect chemical facilities against multiple types of attackers, Reliab. Eng. Syst. Saf., 191 (2019), p. 105900.
[7] H.-M. Kaltenbach, A concise guide to statistics, SpringerBriefs in Statistics, Springer, Heidelberg, 2012.
[8] J. Kisiala, Conditional value-at-risk: Theory and applications, Master’s thesis, University of Edinburgh, 2015.
[9] M. Ouyang, M. Xu, C. Zhang, and S. Huang, Mitigating electric power system vulnerability to worst-case spatially localized attacks, Reliab. Eng. Syst. Saf., 165 (2017), pp. 144–154.
[10] P. J. Phillips, Applying modern portfolio theory to the analysis of terrorism. computing the set of attack method combinations from which the rational terrorist group will choose in order to maximise injuries and fatalities, Defence and Peace Economics, 20 (2009), pp. 193–213.
[11] R. Powell, Defending against terrorist attacks with limited resources, American Political Science Review, 101 (2007), pp. 527–541.
[12] S. M. Robinson, Generalized equations and their solutions, part II: Applications to nonlinear programming, Springer Berlin Heidelberg, 1982, pp. 200–221.
[13] X. Shan and J. Zhuang, Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game, Eur. J. Oper. Res., 228 (2013), pp. 262–272.
[14] , Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi[1]target sequential game, Reliab. Eng. Syst. Saf., 179 (2018), pp. 12–26.
[15] Z. Yazdaniyan, M. Shamsi, Z. Foroozandeh, and M. R. D. Pinho, A numerical method based on the complementarity and optimal control formulations for solving a family of zero-sum pursuit-evasion differential games, J. Comput. Appl. Math., 368 (2020), p. 112535.
[16] Z. Yazdaniyan, M. Shamsi, M. R. D. Pinho, and Z. Foroozandeh, Heuristic artificial bee colony algorithm for solving the homicidal chauffeur differential game, AUT J. Math. Com., 1 (2020), pp. 153–163.
[17] C. Zhang and J. E. Ramirez-Marquez, Protecting critical infrastructures against intentional attacks: A two-stage game with incomplete information, Iie Transactions, 45 (2013), pp. 244–258.
[18] C. Zhang, J. E. Ramirez-Marquez, and J. Wang, Critical infrastructure protection using secrecy–a discrete simultaneous game, Eur. J. Oper. Res., 242 (2015), pp. 212–221.
[19] J. Zhang and J. Zhuang, Modeling a multi-target attacker-defender game with multiple attack types, Reliab. Eng. Syst. Saf., 185 (2019), pp. 465–475.
[20] J. Zhang, J. Zhuang, and V. R. R. Jose, The role of risk preferences in a multi-target defender-attacker resource allocation game, Reliab. Eng. Syst. Saf., 169 (2018), pp. 95–104.
[21] J. Zhuang and V. M. Bier, Balancing terrorism and natural disasters—defensive strategy with endogenous attacker effort, Oper. Res., 55 (2007), pp. 976–991.