[1]
J. Gan, B. An, and Y. Vorobeychik, “Security Games with Protection Externalities”, AAAI, vol. 29, no. 1, Feb. 2015.