Coalition formation, surveillance, and network security: modeling, design, and evaluation