{"id":"https://openalex.org/W2039442723","doi":"https://doi.org/10.1109/tifs.2014.2329241","title":"Incorporating Attack-Type Uncertainty Into Network Protection","display_name":"Incorporating Attack-Type Uncertainty Into Network Protection","publication_year":2014,"publication_date":"2014-06-06","ids":{"openalex":"https://openalex.org/W2039442723","doi":"https://doi.org/10.1109/tifs.2014.2329241","mag":"2039442723"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2329241","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2329241","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086552074","display_name":"Andrey Garnaev","orcid":"https://orcid.org/0000-0003-0821-3812"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andrey Garnaev","raw_affiliation_strings":["Wireless Information Network Laboratory, Rutgers University, North Brunswick, NJ, USA","Wireless Information Network Laboratory, Rutgers University, North Brunswick, NJ, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Wireless Information Network Laboratory, Rutgers University, North Brunswick, NJ, USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"Wireless Information Network Laboratory, Rutgers University, North Brunswick, NJ, USA#TAB#","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074788016","display_name":"Melike Baykal\u2010G\u00fcrsoy","orcid":"https://orcid.org/0000-0003-2341-2326"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Melike Baykal-Gursoy","raw_affiliation_strings":["Department of Industrial and Systems Engineering, Rutgers University, Piscataway, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Industrial and Systems Engineering, Rutgers University, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042307561","display_name":"H. Vincent Poor","orcid":"https://orcid.org/0000-0002-2062-131X"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"H. Vincent Poor","raw_affiliation_strings":["Department of Electrical Engineering, Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5086552074"],"corresponding_institution_ids":["https://openalex.org/I102322142"],"apc_list":null,"apc_paid":null,"fwci":10.4317,"has_fulltext":false,"cited_by_count":56,"citation_normalized_percentile":{"value":0.98411338,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"9","issue":"8","first_page":"1278","last_page":"1287"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11031","display_name":"Game Theory and Applications","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7628360986709595},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7597855925559998},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7588151693344116},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7070326805114746},{"id":"https://openalex.org/keywords/dilemma","display_name":"Dilemma","score":0.5595735311508179},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5252710580825806},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.48328259587287903},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4684068560600281},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.45669087767601013},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.4526883363723755},{"id":"https://openalex.org/keywords/stochastic-game","display_name":"Stochastic game","score":0.4404476284980774},{"id":"https://openalex.org/keywords/bayesian-game","display_name":"Bayesian game","score":0.4386644959449768},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43060630559921265},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.36943838000297546},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.16483259201049805},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1557537019252777},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.09576264023780823}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7628360986709595},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7597855925559998},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7588151693344116},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7070326805114746},{"id":"https://openalex.org/C2778496695","wikidata":"https://www.wikidata.org/wiki/Q254128","display_name":"Dilemma","level":2,"score":0.5595735311508179},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5252710580825806},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.48328259587287903},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4684068560600281},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.45669087767601013},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.4526883363723755},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.4404476284980774},{"id":"https://openalex.org/C200594392","wikidata":"https://www.wikidata.org/wiki/Q812529","display_name":"Bayesian game","level":4,"score":0.4386644959449768},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43060630559921265},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.36943838000297546},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.16483259201049805},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1557537019252777},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.09576264023780823},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2014.2329241","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2329241","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W59197497","https://openalex.org/W598176488","https://openalex.org/W1494233714","https://openalex.org/W1517532457","https://openalex.org/W1532203421","https://openalex.org/W1536792846","https://openalex.org/W1964439345","https://openalex.org/W1964972187","https://openalex.org/W1966962864","https://openalex.org/W1968909445","https://openalex.org/W1969748198","https://openalex.org/W2043907034","https://openalex.org/W2048947090","https://openalex.org/W2062670444","https://openalex.org/W2065624878","https://openalex.org/W2067064328","https://openalex.org/W2093022366","https://openalex.org/W2095070500","https://openalex.org/W2105013775","https://openalex.org/W2105238633","https://openalex.org/W2115634466","https://openalex.org/W2146691488","https://openalex.org/W2155740782","https://openalex.org/W2188652662","https://openalex.org/W3124866767","https://openalex.org/W6629439345","https://openalex.org/W6674060570","https://openalex.org/W6677323796","https://openalex.org/W6686923656"],"related_works":["https://openalex.org/W4230824443","https://openalex.org/W2038807247","https://openalex.org/W2097156747","https://openalex.org/W2559738661","https://openalex.org/W2560823894","https://openalex.org/W2503080310","https://openalex.org/W3002211633","https://openalex.org/W2770991434","https://openalex.org/W4301139417","https://openalex.org/W4315488681"],"abstract_inverted_index":{"Network":[0],"security":[1],"against":[2],"possible":[3],"attacks":[4],"involves":[5],"making":[6],"decisions":[7],"under":[8],"uncertainty.":[9],"Not":[10],"only":[11],"may":[12,28],"one":[13,27],"be":[14,30],"ignorant":[15,32],"of":[16,24,33,49,56,116,132,139,166,168,178,180,215,222,247,269],"the":[17,19,22,34,67,73,78,82,101,127,130,140,148,151,156,170,176,181,195,199,209,213,223,229,237,245,248,255,262,273,278],"place,":[18],"power,":[20],"or":[21,91,98,162],"time":[23],"potential":[25],"attacks,":[26],"also":[29],"largely":[31],"attacker's":[35],"purpose.":[36],"To":[37],"illustrate":[38],"this":[39,41,189,206,270],"phenomenon,":[40],"paper":[42],"proposes":[43],"a":[44,57,61,112,216,233,241],"simple":[45],"Bayesian":[46],"game-theoretic":[47],"model":[48],"allocating":[50],"defensive":[51,125],"(scanning)":[52],"effort":[53],"among":[54],"nodes":[55,110,161],"network":[58,83,102,157],"in":[59,145,173,272,287],"which":[60],"network's":[62,217],"defender":[63,128,256],"does":[64],"not":[65],"know":[66],"adversary's":[68,230,238,274],"motivation":[69],"for":[70,103,111,150],"intruding":[71],"on":[72,93,120,136,194,244],"network,":[74],"e.g.,":[75],"to":[76,81,86,99,108,123,153,188,198,211,258,283],"bring":[77],"maximal":[79],"damage":[80],"(for":[84,106],"example,":[85,107],"steal":[87],"credit":[88],"card":[89],"numbers":[90],"information":[92,196,207],"bank":[94],"accounts":[95],"stored":[96],"there)":[97],"infiltrate":[100],"other":[104,288],"purposes":[105],"corrupt":[109],"further":[113],"distributed":[114],"denial":[115],"service":[117],"botnet":[118],"attack":[119],"servers).":[121],"Due":[122],"limited":[124],"capabilities,":[126],"faces":[129],"dilemma":[131,190],"either:":[133],"1)":[134],"focusing":[135],"increasing":[137,147],"defense":[138,167,179],"most":[141,182],"valuable":[142,160,183],"nodes,":[143,171],"and":[144,172,201,236],"turn,":[146,174],"chance":[149],"adversary":[152],"sneak":[154],"into":[155,260],"through":[158],"less":[159],"2)":[163],"taking":[164],"care":[165],"all":[169],"reducing":[175],"level":[177],"ones.":[184],"An":[185],"explicit":[186],"solution":[187],"is":[191,203],"suggested":[192],"based":[193],"available":[197],"defender,":[200],"it":[202,290],"shown":[204],"how":[205],"allows":[208],"authorities":[210],"increase":[212],"efficiency":[214],"defense.":[218],"Some":[219],"interesting":[220],"properties":[221],"rivals'":[224],"strategies":[225],"are":[226],"presented.":[227],"Notably,":[228],"strategy":[231],"has":[232,257],"node-sharing":[234],"structure":[235],"payoffs":[239],"have":[240],"discontinuous":[242],"dependence":[243],"probability":[246],"attack's":[249],"type.":[250],"This":[251],"discontinuity":[252],"implies":[253],"that":[254],"take":[259],"account":[261],"human":[263],"factor":[264],"since":[265],"some":[266],"threshold":[267],"values":[268],"inclination":[271],"behavior":[275],"could":[276],"make":[277],"defender's":[279],"policy":[280],"very":[281],"sensitive":[282],"small":[284],"perturbations,":[285],"while":[286],"situations":[289],"produces":[291],"minimal":[292],"impact.":[293]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":12},{"year":2014,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
