{"id":"https://openalex.org/W4396534976","doi":"https://doi.org/10.1109/tai.2024.3394392","title":"A Game-Theoretic Approach to Containing Artificial General Intelligence: Insights From Highly Autonomous Aggressive Malware","display_name":"A Game-Theoretic Approach to Containing Artificial General Intelligence: Insights From Highly Autonomous Aggressive Malware","publication_year":2024,"publication_date":"2024-04-29","ids":{"openalex":"https://openalex.org/W4396534976","doi":"https://doi.org/10.1109/tai.2024.3394392"},"language":"en","primary_location":{"id":"doi:10.1109/tai.2024.3394392","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tai.2024.3394392","pdf_url":null,"source":{"id":"https://openalex.org/S4210169448","display_name":"IEEE Transactions on Artificial Intelligence","issn_l":"2691-4581","issn":["2691-4581"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024454231","display_name":"Timothy R. McIntosh","orcid":"https://orcid.org/0000-0003-0836-4266"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Timothy R. McIntosh","raw_affiliation_strings":["Cyberoo Pty Ltd., Surrey Hills, NSW, Australia","Cyberoo Pty Ltd, Surrey Hills, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Cyberoo Pty Ltd., Surrey Hills, NSW, Australia","institution_ids":[]},{"raw_affiliation_string":"Cyberoo Pty Ltd, Surrey Hills, NSW, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037915797","display_name":"Teo Su\u0161njak","orcid":"https://orcid.org/0000-0001-9416-1435"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Teo Susnjak","raw_affiliation_strings":["Massey University, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Massey University, Auckland, New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100392689","display_name":"Tong Liu","orcid":"https://orcid.org/0000-0003-3047-1148"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Tong Liu","raw_affiliation_strings":["Massey University, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Massey University, Auckland, New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074086920","display_name":"Paul Watters","orcid":"https://orcid.org/0000-0002-1399-7175"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Paul Watters","raw_affiliation_strings":["Cyberstronomy Pty Ltd., Ballarat, VIC, Australia","Cyberstronomy Pty Ltd, Ballarat, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Cyberstronomy Pty Ltd., Ballarat, VIC, Australia","institution_ids":[]},{"raw_affiliation_string":"Cyberstronomy Pty Ltd, Ballarat, VIC, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061811149","display_name":"Alex Ng","orcid":"https://orcid.org/0000-0002-5809-2150"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alex Ng","raw_affiliation_strings":["Academies Australasia Polytechnic, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Academies Australasia Polytechnic, Melbourne, VIC, Australia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053757316","display_name":"Malka N. Halgamuge","orcid":"https://orcid.org/0000-0001-9994-3778"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Malka N. Halgamuge","raw_affiliation_strings":["RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5024454231"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":11.4671,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.99141403,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"5","issue":"12","first_page":"6290","last_page":"6303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9708999991416931,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9496999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8208521604537964},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5871304869651794},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4963000416755676},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44409501552581787},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.41719380021095276},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.24962031841278076},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10765960812568665}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8208521604537964},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5871304869651794},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4963000416755676},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44409501552581787},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.41719380021095276},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.24962031841278076},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10765960812568665}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tai.2024.3394392","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tai.2024.3394392","pdf_url":null,"source":{"id":"https://openalex.org/S4210169448","display_name":"IEEE Transactions on Artificial Intelligence","issn_l":"2691-4581","issn":["2691-4581"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1972449564","https://openalex.org/W2017561954","https://openalex.org/W2069421814","https://openalex.org/W2123028958","https://openalex.org/W2157925625","https://openalex.org/W2341475188","https://openalex.org/W2463389769","https://openalex.org/W2889205798","https://openalex.org/W2919398271","https://openalex.org/W2940239739","https://openalex.org/W2963569233","https://openalex.org/W2996586778","https://openalex.org/W3016551615","https://openalex.org/W3092291878","https://openalex.org/W3094503897","https://openalex.org/W3117044899","https://openalex.org/W3173627690","https://openalex.org/W3174808537","https://openalex.org/W3193997983","https://openalex.org/W3205163562","https://openalex.org/W3206660056","https://openalex.org/W4214914607","https://openalex.org/W4226366157","https://openalex.org/W4280505652","https://openalex.org/W4281572676","https://openalex.org/W4288391568","https://openalex.org/W4353069573","https://openalex.org/W4385755118","https://openalex.org/W4386604667","https://openalex.org/W4388442676","https://openalex.org/W4388691793","https://openalex.org/W4392908117","https://openalex.org/W6747850664","https://openalex.org/W6850619096","https://openalex.org/W6852076019","https://openalex.org/W6852272947","https://openalex.org/W6858377521"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2249809453"],"abstract_inverted_index":{"Artificial":[0],"general":[1],"intelligence":[2,36],"(AGI)":[3],"promises":[4],"transformative":[5],"societal":[6],"changes":[7],"but":[8],"poses":[9],"safety":[10],"and":[11,24,29,37,74,85,93,123,157,167],"containment":[12,40,54,91,137,150],"challenges.":[13],"Large":[14],"language":[15],"models":[16],"such":[17],"as":[18,55],"ChatGPT":[19],"have":[20],"intensified":[21],"public":[22],"expectations":[23],"apprehensions":[25],"regarding":[26],"AGI":[27,53,73,95,101,119,163],"capabilities":[28],"risks.":[30],"Existing":[31],"research":[32],"underestimated":[33],"replicating":[34],"human":[35,86,131],"lacks":[38],"effective":[39,152],"strategies":[41,92],"scaled":[42],"for":[43,60,112,161],"AGI's":[44,143],"complexity.":[45],"We":[46,63,88,146],"developed":[47],"a":[48],"cybersecurity-inspired":[49],"framework":[50],"to":[51,67,141],"reconceptualize":[52],"securing":[56],"critical":[57],"infrastructure":[58],"indispensable":[59],"its":[61],"operation.":[62],"applied":[64],"game":[65],"theory":[66],"model":[68,98],"the":[69],"strategic":[70,130],"interplay":[71],"between":[72],"humans,":[75],"drawing":[76],"parallels":[77],"with":[78,165],"highly":[79],"autonomous":[80],"malware,":[81],"emphasizing":[82,139],"infrastructural":[83],"dependencies":[84],"countermeasures.":[87],"introduced":[89],"offensive/defensive":[90],"an":[94],"Kill":[96],"Chain":[97],"profiling":[99],"escalating":[100],"threats.":[102],"Our":[103,133],"game-theoretic":[104],"approach":[105],"examined":[106],"complex":[107],"AGI-human":[108],"interactions":[109],"revealing":[110],"insights":[111],"adaptive":[113],"oversight":[114],"mechanisms.":[115],"Game":[116],"simulations":[117],"demonstrated":[118],"carefully":[120],"manages":[121],"resources":[122],"autonomy":[124],"balancing":[125],"benefits":[126],"against":[127],"risks,":[128],"necessitating":[129],"responses.":[132],"findings":[134],"provided":[135],"detailed":[136],"tactics,":[138],"flexibility":[140],"address":[142],"dynamic":[144],"evolution.":[145],"proposed":[147],"comprehensive,":[148],"multidisciplinary":[149],"strategies,":[151],"governance":[153],"evaluating":[154],"long-term":[155],"efficacy,":[156],"emphasize":[158],"ongoing":[159],"innovation":[160],"aligning":[162],"progression":[164],"utility":[166],"security.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":20}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
