Game theory in cyber security defence | IEEE Conference Publication | IEEE Xplore