{"id":"https://openalex.org/W2081504831","doi":"https://doi.org/10.1080/19393550903130390","title":"An Intrusion Detection Game Theoretical Model","display_name":"An Intrusion Detection Game Theoretical Model","publication_year":2009,"publication_date":"2009-11-06","ids":{"openalex":"https://openalex.org/W2081504831","doi":"https://doi.org/10.1080/19393550903130390","mag":"2081504831"},"language":"en","primary_location":{"id":"doi:10.1080/19393550903130390","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393550903130390","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049846737","display_name":"Hadi Otrok","orcid":"https://orcid.org/0000-0002-9574-5384"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hadi Otrok","raw_affiliation_strings":["Faculty of Engineering , Khalifa University of Science, Technology & Research (KUSTAR) , Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering , Khalifa University of Science, Technology & Research (KUSTAR) , Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088133778","display_name":"Benwen Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Benwen Zhu","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering (CIISE) Concordia University , Montreal, QC, Canada","Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering (CIISE) Concordia University , Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071828856","display_name":"Hamdi Yahyaoui","orcid":"https://orcid.org/0000-0003-1134-1233"},"institutions":[{"id":"https://openalex.org/I36721946","display_name":"Kuwait University","ror":"https://ror.org/021e5j056","country_code":"KW","type":"education","lineage":["https://openalex.org/I36721946"]}],"countries":["KW"],"is_corresponding":true,"raw_author_name":"Hamdi Yahyaoui","raw_affiliation_strings":["Mathematics & Computer Science Department, Faculty of Science , Kuwait University , State of Kuwait"],"affiliations":[{"raw_affiliation_string":"Mathematics & Computer Science Department, Faculty of Science , Kuwait University , State of Kuwait","institution_ids":["https://openalex.org/I36721946"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111872056","display_name":"Prabir Bhattacharya","orcid":null},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Prabir Bhattacharya","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering (CIISE) Concordia University , Montreal, QC, Canada","Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering (CIISE) Concordia University , Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071828856"],"corresponding_institution_ids":["https://openalex.org/I36721946"],"apc_list":null,"apc_paid":null,"fwci":0.3428,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62266433,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"18","issue":"5","first_page":"199","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7967644929885864},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7952836751937866},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.6145647764205933},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5982134342193604},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5177292227745056},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.49337783455848694},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4791388213634491},{"id":"https://openalex.org/keywords/bayesian-game","display_name":"Bayesian game","score":0.467615008354187},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.4662432074546814},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40956252813339233},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4060606360435486},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37316417694091797},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.15905773639678955},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1585783064365387},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15301868319511414}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7967644929885864},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7952836751937866},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.6145647764205933},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5982134342193604},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5177292227745056},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.49337783455848694},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4791388213634491},{"id":"https://openalex.org/C200594392","wikidata":"https://www.wikidata.org/wiki/Q812529","display_name":"Bayesian game","level":4,"score":0.467615008354187},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.4662432074546814},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40956252813339233},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4060606360435486},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37316417694091797},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.15905773639678955},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1585783064365387},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15301868319511414},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/19393550903130390","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393550903130390","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1517532457","https://openalex.org/W1964972187","https://openalex.org/W1965103048","https://openalex.org/W1991958904","https://openalex.org/W2076786893","https://openalex.org/W2090636507","https://openalex.org/W2106747089","https://openalex.org/W2116644838","https://openalex.org/W2126329223","https://openalex.org/W2139263187","https://openalex.org/W2146008397","https://openalex.org/W2152547455","https://openalex.org/W2159164708","https://openalex.org/W2390325517","https://openalex.org/W2797148637","https://openalex.org/W4230163640","https://openalex.org/W4301347335"],"related_works":["https://openalex.org/W1557094818","https://openalex.org/W2993833576","https://openalex.org/W2776877297","https://openalex.org/W3125718803","https://openalex.org/W2127920220","https://openalex.org/W3119288169","https://openalex.org/W2945097178","https://openalex.org/W3123036358","https://openalex.org/W4287778795","https://openalex.org/W2549701036"],"abstract_inverted_index":{"ABSTRACT":[0],"We":[1,51],"propose,":[2],"in":[3,30,43,106,137],"this":[4,138],"article,":[5],"a":[6,128,141],"game":[7,57],"theoretical":[8],"model":[9,85,90,143],"for":[10,151,181],"Host-based":[11],"Intrusion":[12],"Detection":[13],"Systems":[14],"(HIDS).":[15],"The":[16,83],"main":[17],"drawbacks":[18],"of":[19,35,94,101,169,185],"existing":[20],"HIDSs,":[21,60],"such":[22,46],"as":[23,47],"Swatch,":[24],"are":[25,40],"the":[26,33,87,92,95,113,122,146,164,167,174,183],"high":[27],"computation":[28,70],"cost":[29,71],"detection":[31],"and":[32,72,86,148,155],"generation":[34],"false":[36,73,153],"alarms.":[37],"These":[38],"limitations":[39],"not":[41],"acceptable":[42],"resource-limited":[44],"systems":[45],"wireless":[48],"mobile":[49],"devices.":[50],"address":[52],"these":[53,170],"issues":[54],"by":[55],"applying":[56],"theory":[58],"to":[59,120],"so":[61],"that":[62,125,144,178],"HIDSs":[63],"can":[64,103],"discover":[65],"potential":[66],"attackers":[67],"with":[68],"lower":[69],"alarm":[74],"rates.":[75],"To":[76],"achieve":[77],"that,":[78],"we":[79],"explore":[80],"two":[81,171],"solutions:":[82],"Bayesian":[84,147],"Dempster-Shafer":[88],"(DS)":[89],"where":[91,112],"identity":[93,115],"attacker":[96],"is":[97,116,130,140,179],"unknown.":[98,117],"Such":[99],"type":[100],"models":[102,150,172],"be":[104],"used":[105,180],"Mobile":[107],"Ad":[108],"hoc":[109],"Networks":[110],"(MANET)":[111],"sender":[114,129],"They":[118],"help":[119],"determine":[121],"belief":[123,176],"value":[124],"determines":[126],"whether":[127],"misbehaving":[131],"or":[132],"not.":[133],"Our":[134,160],"novel":[135],"contribution":[136],"article":[139],"hybrid":[142],"combines":[145],"DS":[149],"decreasing":[152],"positives":[154],"detecting":[156],"accurately":[157],"an":[158],"attacker.":[159],"simulation":[161],"results":[162],"show":[163],"benefits":[165],"from":[166],"combination":[168],"regarding":[173],"posterior":[175],"function":[177],"increasing":[182],"possibility":[184],"intrusion":[186],"detection.":[187]},"counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
