{"id":"https://openalex.org/W3013160592","doi":"https://doi.org/10.1109/icnc47757.2020.9049764","title":"Honeypot Allocation over Attack Graphs in Cyber Deception Games","display_name":"Honeypot Allocation over Attack Graphs in Cyber Deception Games","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3013160592","doi":"https://doi.org/10.1109/icnc47757.2020.9049764","mag":"3013160592"},"language":"en","primary_location":{"id":"doi:10.1109/icnc47757.2020.9049764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc47757.2020.9049764","pdf_url":null,"source":{"id":"https://openalex.org/S4306498707","display_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109171008","display_name":"Ahmed H. Anwar","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ahmed H. Anwar","raw_affiliation_strings":["US Army Research Lab, 2800 Powder Mill Rd, Adelphi, MD"],"affiliations":[{"raw_affiliation_string":"US Army Research Lab, 2800 Powder Mill Rd, Adelphi, MD","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090126029","display_name":"Charles Kamhoua","orcid":"https://orcid.org/0000-0003-2169-5975"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles Kamhoua","raw_affiliation_strings":["US Army Research Lab, 2800 Powder Mill Rd, Adelphi, MD"],"affiliations":[{"raw_affiliation_string":"US Army Research Lab, 2800 Powder Mill Rd, Adelphi, MD","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075553610","display_name":"Nandi Leslie","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nandi Leslie","raw_affiliation_strings":["US Army Research Lab, 2800 Powder Mill Rd, Adelphi, MD"],"affiliations":[{"raw_affiliation_string":"US Army Research Lab, 2800 Powder Mill Rd, Adelphi, MD","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5109171008"],"corresponding_institution_ids":["https://openalex.org/I166416128"],"apc_list":null,"apc_paid":null,"fwci":7.4877,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.98257183,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"502","last_page":"506"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9313668012619019},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7447896003723145},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6825425028800964},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6686476469039917},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.6682194471359253},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.6309691667556763},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4820767045021057},{"id":"https://openalex.org/keywords/strategy","display_name":"Strategy","score":0.43193820118904114},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4266113042831421},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.4219076633453369},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2945699691772461},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.28115999698638916},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.2027624547481537},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11345386505126953}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9313668012619019},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7447896003723145},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6825425028800964},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6686476469039917},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.6682194471359253},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.6309691667556763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4820767045021057},{"id":"https://openalex.org/C88959737","wikidata":"https://www.wikidata.org/wiki/Q1546627","display_name":"Strategy","level":3,"score":0.43193820118904114},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4266113042831421},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.4219076633453369},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2945699691772461},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.28115999698638916},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.2027624547481537},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11345386505126953},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnc47757.2020.9049764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc47757.2020.9049764","pdf_url":null,"source":{"id":"https://openalex.org/S4306498707","display_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W28012414","https://openalex.org/W35207562","https://openalex.org/W1576185228","https://openalex.org/W1922327879","https://openalex.org/W2034218563","https://openalex.org/W2120942677","https://openalex.org/W2124280970","https://openalex.org/W2527986897","https://openalex.org/W2794861508","https://openalex.org/W2892384966","https://openalex.org/W2892594120","https://openalex.org/W2893340409","https://openalex.org/W2913338075","https://openalex.org/W2963398124","https://openalex.org/W4246379277","https://openalex.org/W6601415641","https://openalex.org/W6634619446","https://openalex.org/W6749728326"],"related_works":["https://openalex.org/W2350724208","https://openalex.org/W3142690625","https://openalex.org/W2000018903","https://openalex.org/W1534090575","https://openalex.org/W2360866534","https://openalex.org/W2372392697","https://openalex.org/W4312961703","https://openalex.org/W2362932354","https://openalex.org/W2998623387","https://openalex.org/W2391396896"],"abstract_inverted_index":{"In":[0],"this":[1,62],"paper,":[2],"we":[3],"propose":[4],"a":[5,17,66,93,99,105],"scalable":[6,106],"algorithm":[7,107],"to":[8,72,79,110,127],"allocate":[9],"honeypots":[10,112],"over":[11],"an":[12,27],"attack":[13],"graph.":[14],"We":[15],"formulate":[16],"two-person":[18],"zero-sum":[19],"strategic":[20],"game":[21,41,63,101],"between":[22],"the":[23,32,38,45,55,59,73,77,80],"network":[24,81],"defender":[25],"and":[26,90,104],"attacker.":[28,60],"This":[29],"formulation":[30],"captures":[31],"importance":[33],"of":[34,98,121],"different":[35,49],"nodes":[36],"inside":[37],"network.":[39],"The":[40,96],"mode":[42],"accounts":[43],"for":[44,92],"cost":[46,56],"associated":[47],"with":[48,70],"defense":[50,85],"strategies":[51,86],"as":[52,54],"well":[53],"paid":[57],"by":[58],"Moreover,":[61],"model":[64,69],"considers":[65],"practical":[67],"threat":[68],"respect":[71],"available":[74],"information":[75],"about":[76],"attacker":[78],"defender.":[82],"Nash":[83],"equilibrium":[84],"are":[87,125],"analytically":[88],"characterized":[89],"studied":[91],"special":[94],"game.":[95],"complexity":[97],"general":[100],"is":[102,108],"discussed":[103],"proposed":[109],"obtain":[111],"allocation":[113],"strategy":[114],"in":[115],"large":[116],"scale":[117],"networks.":[118],"Finally,":[119],"samples":[120],"our":[122,129],"numerical":[123],"results":[124],"shown":[126],"verify":[128],"findings.":[130]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":6}],"updated_date":"2026-03-06T06:45:51.903784","created_date":"2025-10-10T00:00:00"}
