{"id":"https://openalex.org/W2561662432","doi":"https://doi.org/10.1109/tetci.2016.2637410","title":"Novel Solution Approach for Multi-Objective Attack-Defense Cyber Games With Unknown Utilities of the Opponent","display_name":"Novel Solution Approach for Multi-Objective Attack-Defense Cyber Games With Unknown Utilities of the Opponent","publication_year":2016,"publication_date":"2016-12-19","ids":{"openalex":"https://openalex.org/W2561662432","doi":"https://doi.org/10.1109/tetci.2016.2637410","mag":"2561662432"},"language":"en","primary_location":{"id":"doi:10.1109/tetci.2016.2637410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetci.2016.2637410","pdf_url":null,"source":{"id":"https://openalex.org/S4210210251","display_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","issn_l":"2471-285X","issn":["2471-285X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072930044","display_name":"Erella Eisenstadt","orcid":null},"institutions":[{"id":"https://openalex.org/I231622532","display_name":"ORT Braude College","ror":"https://ror.org/004af2v94","country_code":"IL","type":"education","lineage":["https://openalex.org/I231622532"]},{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Erella Eisenstadt","raw_affiliation_strings":["Department of Mechanical Engineering, ORT Braude College of Engineering, Karmiel, Israel","School of Mechanical Engineering, Tel-Aviv University, Tel-Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical Engineering, ORT Braude College of Engineering, Karmiel, Israel","institution_ids":["https://openalex.org/I231622532"]},{"raw_affiliation_string":"School of Mechanical Engineering, Tel-Aviv University, Tel-Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080086948","display_name":"Amiram Moshaiov","orcid":"https://orcid.org/0000-0002-9726-6918"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Amiram Moshaiov","raw_affiliation_strings":["School of Mechanical Engineering and Sagol School of Neuroscience, Tel Aviv University, Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"School of Mechanical Engineering and Sagol School of Neuroscience, Tel Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072930044"],"corresponding_institution_ids":["https://openalex.org/I16391192","https://openalex.org/I231622532"],"apc_list":null,"apc_paid":null,"fwci":10.6159,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.98166742,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"1","issue":"1","first_page":"16","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9706000089645386,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9519000053405762,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7525452375411987},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.6114499568939209},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5302776098251343},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5299713611602783},{"id":"https://openalex.org/keywords/computational-intelligence","display_name":"Computational intelligence","score":0.4556998014450073},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4541170597076416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2733197808265686},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.1462499499320984},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10608026385307312}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7525452375411987},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.6114499568939209},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5302776098251343},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5299713611602783},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.4556998014450073},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4541170597076416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2733197808265686},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.1462499499320984},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10608026385307312},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tetci.2016.2637410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetci.2016.2637410","pdf_url":null,"source":{"id":"https://openalex.org/S4210210251","display_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","issn_l":"2471-285X","issn":["2471-285X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322596","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1422351985","https://openalex.org/W1480597123","https://openalex.org/W1520231688","https://openalex.org/W1595498733","https://openalex.org/W1828008172","https://openalex.org/W1950717522","https://openalex.org/W1964439345","https://openalex.org/W1979505449","https://openalex.org/W2002181184","https://openalex.org/W2019207321","https://openalex.org/W2053488431","https://openalex.org/W2062757535","https://openalex.org/W2065527711","https://openalex.org/W2082666187","https://openalex.org/W2098907614","https://openalex.org/W2126105956","https://openalex.org/W2139669429","https://openalex.org/W2156607688","https://openalex.org/W2187667592","https://openalex.org/W2265830209","https://openalex.org/W2490339427","https://openalex.org/W2513581858","https://openalex.org/W2798741797","https://openalex.org/W2994383963","https://openalex.org/W4254073045","https://openalex.org/W6630967863","https://openalex.org/W6638734567"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W2367268135","https://openalex.org/W4237162029","https://openalex.org/W1480190076","https://openalex.org/W2385701518","https://openalex.org/W4237464767","https://openalex.org/W2395750098","https://openalex.org/W1658340114","https://openalex.org/W3122105331"],"abstract_inverted_index":{"A":[0],"nontraditional":[1,109],"game-theoretic":[2,36],"approach":[3,24,111,129],"has":[4],"been":[5],"recently":[6],"suggested":[7,104],"for":[8,134,153,168,181,190,208],"solving":[9,56,169],"Multi-Objective":[10],"Games":[11],"(MOGs).":[12],"This":[13],"paper":[14,194],"aims":[15],"to":[16,25,94,148],"highlight":[17],"the":[18,45,96,108,121,127,146,175,202],"applicability":[19],"and":[20,87,107,199,235],"advantage":[21],"of":[22,61,67,78,98,187,204],"this":[23,29,193],"cyber":[26,136,172,191,209],"security.":[27],"For":[28],"purpose,":[30],"we":[31,124,162],"describe":[32],"a":[33,40,58,65,76,115,150,159,196],"new":[34,132],"attack-defence":[35],"model.":[37],"It":[38],"involves":[39],"zero-sum":[41],"MOG":[42],"in":[43,64,185],"which":[44],"players":[46],"are":[47,85,101,112],"undecided":[48],"about":[49],"their":[50],"objective":[51],"preferences.":[52],"As":[53],"demonstrated":[54,113,122],"here,":[55,214],"such":[57,211,230],"unique":[59],"type":[60],"game":[62],"results":[63],"set":[66,77,97],"rationalizable":[68,99],"strategies":[69,100],"wherein":[70],"each":[71,154],"strategy":[72,82],"is":[73],"associated":[74],"with":[75],"performance":[79],"vectors.":[80],"Set-based":[81],"selection":[83],"techniques":[84],"introduced":[86],"demonstrated.":[88],"In":[89],"addition,":[90],"existing":[91],"evolutionary":[92,220],"algorithms":[93,167],"finding":[95],"discussed.":[102],"The":[103],"cyber-game":[105],"model":[106],"solution":[110],"using":[114],"simple":[116],"academic":[117],"example.":[118],"Based":[119],"on":[120,158],"case,":[123],"conclude":[125,164],"that":[126,165],"described":[128],"opens":[130],"up":[131],"possibilities":[133],"analyzing":[135],"defense":[137],"strategies.":[138],"Namely,":[139],"it":[140],"allows":[141],"tradeoff":[142],"considerations":[143],"by":[144,174],"eliminating":[145],"need":[147],"predefine":[149],"utility":[151],"function":[152],"player.":[155],"Moreover,":[156],"based":[157],"time-complexity":[160],"analysis,":[161],"also":[163,224],"future":[166],"real-life":[170],"multiobjective":[171],"games,":[173],"proposed":[176,213],"method,":[177],"should":[178],"be":[179],"adjusted":[180],"parallel":[182],"processing.":[183],"Finally,":[184],"view":[186,198],"practical":[188],"needs":[189],"security,":[192],"takes":[195],"broader":[197],"discusses":[200],"how":[201],"development":[203],"game-based":[205],"computational":[206,227],"tools":[207],"defence,":[210],"as":[212,231],"may":[215],"benefit":[216],"not":[217],"just":[218],"from":[219,225],"computation":[221],"methods":[222],"but":[223],"other":[226],"intelligence":[228],"methods,":[229],"fuzzy":[232],"inference":[233],"systems":[234],"artificial":[236],"neural":[237],"networks.":[238]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
