{"id":"https://openalex.org/W2034114744","doi":"https://doi.org/10.1109/icitst.2013.6750213","title":"DGM approach to network attacker and defender strategies","display_name":"DGM approach to network attacker and defender strategies","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W2034114744","doi":"https://doi.org/10.1109/icitst.2013.6750213","mag":"2034114744"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2013.6750213","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750213","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Alese Boniface Kayode","orcid":null},"institutions":[{"id":"https://openalex.org/I180664298","display_name":"Federal University of Technology","ror":"https://ror.org/01pvx8v81","country_code":"NG","type":"education","lineage":["https://openalex.org/I180664298"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Alese Boniface Kayode","raw_affiliation_strings":["Department of Computer Science, Federal University of Technology, Akure, Nigeria","Department of Computer Science , Federal University of Technology , Akure , Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Federal University of Technology, Akure, Nigeria","institution_ids":["https://openalex.org/I180664298"]},{"raw_affiliation_string":"Department of Computer Science , Federal University of Technology , Akure , Nigeria","institution_ids":["https://openalex.org/I180664298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035146986","display_name":"Gabriel Babatunde Iwasokun","orcid":"https://orcid.org/0000-0002-9775-5631"},"institutions":[{"id":"https://openalex.org/I180664298","display_name":"Federal University of Technology","ror":"https://ror.org/01pvx8v81","country_code":"NG","type":"education","lineage":["https://openalex.org/I180664298"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Iwasokun Gabriel Babatunde","raw_affiliation_strings":["Department of Computer Science, Federal University of Technology, Akure, Nigeria","Department of Computer Science , Federal University of Technology , Akure , Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Federal University of Technology, Akure, Nigeria","institution_ids":["https://openalex.org/I180664298"]},{"raw_affiliation_string":"Department of Computer Science , Federal University of Technology , Akure , Nigeria","institution_ids":["https://openalex.org/I180664298"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072959496","display_name":"Haruna Danjuma Israel","orcid":null},"institutions":[{"id":"https://openalex.org/I180664298","display_name":"Federal University of Technology","ror":"https://ror.org/01pvx8v81","country_code":"NG","type":"education","lineage":["https://openalex.org/I180664298"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Haruna Danjuma Israel","raw_affiliation_strings":["Department of Computer Science, Federal University of Technology, Akure, Nigeria","Department of Computer Science , Federal University of Technology , Akure , Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Federal University of Technology, Akure, Nigeria","institution_ids":["https://openalex.org/I180664298"]},{"raw_affiliation_string":"Department of Computer Science , Federal University of Technology , Akure , Nigeria","institution_ids":["https://openalex.org/I180664298"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I180664298"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.13052064,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"313","last_page":"320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8166095614433289},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5525974631309509},{"id":"https://openalex.org/keywords/strategy","display_name":"Strategy","score":0.4987039566040039},{"id":"https://openalex.org/keywords/anticipation","display_name":"Anticipation (artificial intelligence)","score":0.4652353823184967},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.4373440146446228},{"id":"https://openalex.org/keywords/game-tree","display_name":"Game tree","score":0.4241184890270233},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4230569005012512},{"id":"https://openalex.org/keywords/game-programming","display_name":"Game programming","score":0.41488727927207947},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.3823779225349426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3415994644165039},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.29995036125183105},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20935854315757751},{"id":"https://openalex.org/keywords/game-developer","display_name":"Game Developer","score":0.16815689206123352},{"id":"https://openalex.org/keywords/game-design","display_name":"Game design","score":0.15337321162223816}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8166095614433289},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5525974631309509},{"id":"https://openalex.org/C88959737","wikidata":"https://www.wikidata.org/wiki/Q1546627","display_name":"Strategy","level":3,"score":0.4987039566040039},{"id":"https://openalex.org/C176777502","wikidata":"https://www.wikidata.org/wiki/Q4774623","display_name":"Anticipation (artificial intelligence)","level":2,"score":0.4652353823184967},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.4373440146446228},{"id":"https://openalex.org/C95815963","wikidata":"https://www.wikidata.org/wiki/Q1377033","display_name":"Game tree","level":4,"score":0.4241184890270233},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4230569005012512},{"id":"https://openalex.org/C109347269","wikidata":"https://www.wikidata.org/wiki/Q1753830","display_name":"Game programming","level":5,"score":0.41488727927207947},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.3823779225349426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3415994644165039},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.29995036125183105},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20935854315757751},{"id":"https://openalex.org/C41826821","wikidata":"https://www.wikidata.org/wiki/Q844005","display_name":"Game Developer","level":3,"score":0.16815689206123352},{"id":"https://openalex.org/C503285160","wikidata":"https://www.wikidata.org/wiki/Q858057","display_name":"Game design","level":2,"score":0.15337321162223816},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C6907630","wikidata":"https://www.wikidata.org/wiki/Q3010535","display_name":"Game design document","level":4,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2013.6750213","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750213","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W135902891","https://openalex.org/W1481009986","https://openalex.org/W1964125863","https://openalex.org/W1964972187","https://openalex.org/W1974111917","https://openalex.org/W1983233231","https://openalex.org/W2015096700","https://openalex.org/W2021364383","https://openalex.org/W2030047753","https://openalex.org/W2035472371","https://openalex.org/W2044774849","https://openalex.org/W2045814518","https://openalex.org/W2047575751","https://openalex.org/W2050246638","https://openalex.org/W2050603475","https://openalex.org/W2058612697","https://openalex.org/W2067064328","https://openalex.org/W2074880393","https://openalex.org/W2077048052","https://openalex.org/W2080580518","https://openalex.org/W2083911205","https://openalex.org/W2118949809","https://openalex.org/W2138872303","https://openalex.org/W2145881380","https://openalex.org/W2304998032","https://openalex.org/W2575731723","https://openalex.org/W4234029144","https://openalex.org/W4255775918","https://openalex.org/W6605567061","https://openalex.org/W6667198423"],"related_works":["https://openalex.org/W3049339943","https://openalex.org/W2391693198","https://openalex.org/W2098501469","https://openalex.org/W4254667630","https://openalex.org/W47369278","https://openalex.org/W4234963057","https://openalex.org/W1604386627","https://openalex.org/W4232747721","https://openalex.org/W2560994747","https://openalex.org/W1605217022"],"abstract_inverted_index":{"The":[0,93,126,149,171],"computer":[1,91],"game":[2,12,38,52,107],"framework":[3],"is":[4,15,39,53,101,110,159,173,178],"an":[5,36,96],"extension":[6],"of":[7,35,51,72,90,123,128,151,189],"attack":[8,130],"graphs":[9],"based":[10],"on":[11,58,131],"theory.":[13],"It":[14],"used":[16,181],"to":[17,40,119],"anticipate":[18],"and":[19,22,55,69,98,144,169,200],"analyze":[20],"intruder":[21],"administrator":[23],"concurrent":[24],"interactions":[25],"within":[26],"the":[27,33,65,88,121,124,142,145,152,190,201,205],"network.":[28],"Like":[29],"attack-graph-based":[30],"model":[31,109,153],"checking,":[32],"goal":[34],"anticipation":[37],"prove":[41],"that":[42,64],"a":[43,79,99,113,132,160,179],"safety":[44],"property":[45],"holds.":[46],"However,":[47],"using":[48,112,156,175],"this":[49],"kind":[50],"tedious":[54],"error":[56],"prone":[57],"large":[59],"networks":[60],"because":[61],"it":[62],"assumes":[63],"analyst":[66],"has":[67],"prior":[68],"complete":[70],"knowledge":[71],"critical":[73],"network":[74,133],"services.":[75],"This":[76],"work":[77],"presents":[78],"non-zero,":[80],"Deterministic":[81],"Game-Theoretic":[82],"Modeling":[83],"(DGM)":[84],"method":[85],"for":[86,141],"analyzing":[87],"security":[89],"networks.":[92],"interaction":[94],"between":[95],"attacker":[97,136,143],"defender":[100,146],"viewed":[102],"as":[103],"two-player":[104],"non-zero":[105],"deterministic":[106],"whose":[108],"constructed":[111],"saddle":[114],"point":[115],"solution":[116],"(non-linear":[117],"program)":[118],"compute":[120],"value":[122],"game.":[125],"probability":[127],"possible":[129],"given":[134],"available":[135],"strategy":[137],"or":[138],"best-response":[139],"strategies":[140],"was":[147,154],"demonstrated.":[148],"simulation":[150],"achieved":[155],"Java,":[157],"which":[158,177],"high":[161],"level":[162],"language":[163],"with":[164,195],"object":[165],"oriented":[166],"programming":[167],"capabilities":[168],"features.":[170],"backend":[172],"implemented":[174],"MySQL,":[176],"widely":[180],"relational":[182],"database":[183],"management":[184],"system":[185],"(RDBMS).":[186],"Selected":[187],"results":[188],"games":[191],"played":[192],"were":[193],"presented":[194],"analysis":[196],"showingsome":[197],"likelyattacker":[198],"activities":[199],"counter":[202],"measures":[203],"from":[204],"defender.":[206]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
