Text this: Defending on networks : applying game theory to prevent illegal activities in structured security domains

            _____     _____     _____             
  ____     |  ___||  /  ___||  |  ___||   ____    
 |    \\   | ||__   | // __    | ||__    |    \\  
 | [] ||   | ||__   | \\_\ ||  | ||__    | [] ||  
 |  __//   |_____||  \____//   |_____||  |  __//  
 |_|`-`    `-----`    `---`    `-----`   |_|`-`   
 `-`                                     `-`