“…Among papers cited above, the followings consider networks as security spaces to make the models realistic: [35], [11], [12], [3], [4], [10], [34], [5], [30], [1], [2], [40], [27], [17], [9], [37], [23], [43], [8], [39], [21], [15], [16] and [18]. Among these researches, just [15], [16] and [18] explicitly take account of attrition on players, which would occur through the conflict between attackers and defenders.…”