References I Gary Anthes, Mechanism design meets computer science., Commun. ACM 53 (2010), no. 8, 11–13. Daniel Bilar, On nth order attacks, The virtual battlefield : Perspectives on cyber warfare (Christian Czosseck and Kenneth Geers, eds.), IOS Press, 2009, pp. 262–281. , Degradation and subversion through subsystem attacks, IEEE Security & Privacy 8 (2010), no. 4, 70–73. D. Bilar, J. Murphy, and G. Cybenko, Adversarial dynamics: Conficker case study, Moving Target Defenses (S. Jajodia, ed.), vol. II, Springer, 2013, pp. 41–71. Jean Carlson and John Doyle, Highly Optimized Tolerance: Robustness and Design in Complex Systems, Physical Review Letters 84 (2000), no. 11, 2529+. Cesar Cerrudo, Hacking us tra c control systems, DefCon, vol. 22, 2014. Aaron Clauset, Cosma R. Shalizi, and Mark Newman, Power-Law Distributions in Empirical Data, SIAM Reviews (2007).