{"id":"https://openalex.org/W1985906366","doi":"https://doi.org/10.1109/globalsip.2014.7032232","title":"Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints","display_name":"Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W1985906366","doi":"https://doi.org/10.1109/globalsip.2014.7032232","mag":"1985906366"},"language":"en","primary_location":{"id":"doi:10.1109/globalsip.2014.7032232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globalsip.2014.7032232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013747973","display_name":"Ming Zhang","orcid":"https://orcid.org/0000-0003-3085-3074"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ming Zhang","raw_affiliation_strings":["Department of CSE, The Ohio State University","[Department of CSE, The Ohio State University]"],"affiliations":[{"raw_affiliation_string":"Department of CSE, The Ohio State University","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"[Department of CSE, The Ohio State University]","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101615991","display_name":"Zizhan Zheng","orcid":"https://orcid.org/0000-0003-4799-1051"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zizhan Zheng","raw_affiliation_strings":["Department of CSE, The Ohio State University","[Department of ECE, The Ohio State University]"],"affiliations":[{"raw_affiliation_string":"Department of CSE, The Ohio State University","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"[Department of ECE, The Ohio State University]","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035752536","display_name":"Ness B. Shroff","orcid":"https://orcid.org/0000-0002-4606-6879"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ness B. Shroff","raw_affiliation_strings":["Department of ECE and CSE, The Ohio State University"],"affiliations":[{"raw_affiliation_string":"Department of ECE and CSE, The Ohio State University","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013747973"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":null,"apc_paid":null,"fwci":7.1,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.96530477,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"813","last_page":"817"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.704270601272583},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6991713643074036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.688040554523468},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.6395342350006104},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.5896176099777222},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.588797926902771},{"id":"https://openalex.org/keywords/best-response","display_name":"Best response","score":0.5509289503097534},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.48369771242141724},{"id":"https://openalex.org/keywords/resource-constraints","display_name":"Resource constraints","score":0.4667966961860657},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.42729777097702026},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2371203601360321},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.2023085057735443},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.1901184618473053},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1778692603111267},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12044787406921387},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08189821243286133}],"concepts":[{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.704270601272583},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6991713643074036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.688040554523468},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.6395342350006104},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5896176099777222},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.588797926902771},{"id":"https://openalex.org/C32407928","wikidata":"https://www.wikidata.org/wiki/Q2733833","display_name":"Best response","level":3,"score":0.5509289503097534},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.48369771242141724},{"id":"https://openalex.org/C3017813396","wikidata":"https://www.wikidata.org/wiki/Q17078173","display_name":"Resource constraints","level":2,"score":0.4667966961860657},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.42729777097702026},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2371203601360321},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.2023085057735443},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.1901184618473053},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1778692603111267},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12044787406921387},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08189821243286133},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globalsip.2014.7032232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globalsip.2014.7032232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W156783801","https://openalex.org/W568984285","https://openalex.org/W988103176","https://openalex.org/W1592657892","https://openalex.org/W1985906366","https://openalex.org/W2006942880","https://openalex.org/W2015787697","https://openalex.org/W2132914006","https://openalex.org/W2228084941","https://openalex.org/W4236841844","https://openalex.org/W4253730333","https://openalex.org/W6679567685"],"related_works":["https://openalex.org/W2236801283","https://openalex.org/W2728657731","https://openalex.org/W1853631319","https://openalex.org/W2092374696","https://openalex.org/W2481143976","https://openalex.org/W2803932348","https://openalex.org/W3207342620","https://openalex.org/W2607684552","https://openalex.org/W2013767790","https://openalex.org/W2111030377"],"abstract_inverted_index":{"Stealthy":[0],"attacks":[1,75],"are":[2,93],"a":[3,29,63,68],"major":[4],"threat":[5],"to":[6,24,33,37],"cyber":[7],"security.":[8],"In":[9,60],"practice,":[10],"both":[11,87,126],"attackers":[12],"and":[13,90,98,129,132],"defenders":[14],"have":[15],"resource":[16,58],"constraints":[17],"that":[18],"could":[19],"limit":[20],"their":[21],"capabilities.":[22],"Hence,":[23],"develop":[25],"robust":[26],"defense":[27,92],"strategies,":[28],"promising":[30],"approach":[31],"is":[32,76],"utilize":[34],"game":[35],"theory":[36],"understand":[38],"the":[39,52,80,84,88,91,104,109,119,127,130,134,138],"fundamental":[40],"tradeoffs":[41],"involved.":[42],"Previous":[43],"works":[44],"in":[45],"this":[46,61],"direction,":[47],"however,":[48],"mainly":[49],"focus":[50],"on":[51],"single-node":[53],"case":[54],"without":[55],"considering":[56],"strict":[57],"constraints.":[59],"paper,":[62],"game-theoretic":[64],"model":[65],"for":[66,125],"protecting":[67],"system":[69],"of":[70,86,111,137],"multiple":[71],"nodes":[72,112],"against":[73],"stealthy":[74],"proposed.":[77],"We":[78,121],"consider":[79],"practical":[81],"setting":[82],"where":[83,103],"frequencies":[85],"attack":[89],"constrained":[94],"by":[95],"limited":[96],"resources,":[97],"an":[99],"asymmetric":[100],"feedback":[101],"structure":[102],"attacker":[105],"can":[106],"fully":[107],"observe":[108],"states":[110],"while":[113],"largely":[114],"hiding":[115],"its":[116],"actions":[117],"from":[118],"defender.":[120],"characterize":[122],"best":[123],"strategies":[124],"defender":[128],"attacker,":[131],"study":[133],"Nash":[135],"Equilibria":[136],"game.":[139]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
