{"id":"https://openalex.org/W2991296265","doi":"https://doi.org/10.1109/isncc.2019.8909197","title":"A Decentralized Multi-ruling Arbiter for Cyberspace Mimicry Defense","display_name":"A Decentralized Multi-ruling Arbiter for Cyberspace Mimicry Defense","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2991296265","doi":"https://doi.org/10.1109/isncc.2019.8909197","mag":"2991296265"},"language":"en","primary_location":{"id":"doi:10.1109/isncc.2019.8909197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc.2019.8909197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037799648","display_name":"Congqi Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Congqi Shen","raw_affiliation_strings":["Zhejiang Lab, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Lab, Hangzhou, China","institution_ids":["https://openalex.org/I4210123185"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028513607","display_name":"Shuang-Xi Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I4210132079","display_name":"Hangzhou Wanxiang Polytechnic","ror":"https://ror.org/03sxnxp24","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210132079"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang-Xi Chen","raw_affiliation_strings":["Polytechnic Institute, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Polytechnic Institute, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4210132079","https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078198240","display_name":"Chunming Wu","orcid":"https://orcid.org/0000-0001-7958-9687"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chun-Ming Wu","raw_affiliation_strings":["College of Computer Science, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037799648"],"corresponding_institution_ids":["https://openalex.org/I4210123185"],"apc_list":null,"apc_paid":null,"fwci":0.3537,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.64743031,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arbiter","display_name":"Arbiter","score":0.9872192144393921},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7220453023910522},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6090521812438965},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5505703091621399},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.5151737928390503},{"id":"https://openalex.org/keywords/arbitration","display_name":"Arbitration","score":0.5105310678482056},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3540065884590149},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32407307624816895},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2902210056781769},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.12938129901885986},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.11619260907173157},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08226040005683899}],"concepts":[{"id":"https://openalex.org/C2779971761","wikidata":"https://www.wikidata.org/wiki/Q629872","display_name":"Arbiter","level":2,"score":0.9872192144393921},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7220453023910522},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6090521812438965},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5505703091621399},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.5151737928390503},{"id":"https://openalex.org/C160151201","wikidata":"https://www.wikidata.org/wiki/Q207946","display_name":"Arbitration","level":2,"score":0.5105310678482056},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3540065884590149},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32407307624816895},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2902210056781769},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.12938129901885986},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.11619260907173157},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08226040005683899},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc.2019.8909197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc.2019.8909197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1996734634","https://openalex.org/W2363253911","https://openalex.org/W2552811423","https://openalex.org/W2590693457","https://openalex.org/W2597344931","https://openalex.org/W2740456586","https://openalex.org/W2794554712","https://openalex.org/W7001964796","https://openalex.org/W7054548216"],"related_works":["https://openalex.org/W2884038052","https://openalex.org/W2982348224","https://openalex.org/W2135481122","https://openalex.org/W3161858668","https://openalex.org/W2115668703","https://openalex.org/W4230671735","https://openalex.org/W143296170","https://openalex.org/W2129720900","https://openalex.org/W2138266884","https://openalex.org/W3124125590"],"abstract_inverted_index":{"Cyberspace":[0],"Mimicry":[1],"Defense":[2],"(CMD)":[3],"has":[4],"been":[5],"widely":[6],"used":[7],"to":[8,62,107],"achieve":[9,63],"intrusion":[10],"prevention":[11],"against":[12,142,158],"unknown":[13],"system":[14],"vulnerabilities":[15],"or":[16],"backdoors.":[17],"The":[18],"multi-ruling":[19,34,51,76,103,121,138],"arbiter":[20,35,52,139],"is":[21,140],"a":[22,49,58,119],"key":[23],"part":[24],"in":[25],"CMD.":[26],"This":[27],"paper":[28],"focuses":[29],"on":[30,99,125],"the":[31,41,91,95,100,109,133,136,151],"problem":[32],"of":[33,43,94,102,112],"under":[36],"data":[37,70,80,85,96,114,144,160],"injection":[38,71,81,86,97,115,145,161],"attack":[39,72,82,98],"from":[40],"perspective":[42],"attacker":[44],"and":[45,56,83],"defender.":[46],"We":[47,67],"build":[48],"decentralized":[50,75,137],"model":[53],"for":[54,74],"arbitration":[55,122,153],"introduced":[57],"standard":[59],"iteration":[60],"process":[61],"consensus":[64],"without":[65],"attackers.":[66],"describe":[68],"two":[69],"models":[73],"arbiter,":[77],"namely":[78],"random":[79,113,143,159],"stealthy":[84],"attack.":[87],"Further,":[88],"we":[89,117],"characterize":[90],"negative":[92,110],"effect":[93,111],"performance":[101],"correctness.":[104],"In":[105],"order":[106],"mitigate":[108],"attack,":[116],"propose":[118],"reliable":[120],"approach":[123,154],"based":[124],"adaptive":[126],"threshold.":[127],"By":[128],"cutting":[129],"future":[130],"communication":[131],"with":[132],"malicious":[134],"neighbor,":[135],"robust":[141],"attacks.":[146,162],"Simulation":[147],"results":[148],"show":[149],"that":[150],"proposed":[152],"can":[155],"effectively":[156],"defend":[157]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
