[1]
V. Conitzer, “Computing Game-Theoretic Solutions and Applications to Security”, AAAI, vol. 26, no. 1, pp. 2106-2112, Sep. 2021.