{"id":"https://openalex.org/W2007908076","doi":"https://doi.org/10.1145/2699026.2699133","title":"A Network Security Game Model","display_name":"A Network Security Game Model","publication_year":2015,"publication_date":"2015-02-23","ids":{"openalex":"https://openalex.org/W2007908076","doi":"https://doi.org/10.1145/2699026.2699133","mag":"2007908076"},"language":"en","primary_location":{"id":"doi:10.1145/2699026.2699133","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2699026.2699133","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029787437","display_name":"Vivek Shandilya","orcid":"https://orcid.org/0000-0002-1279-4069"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vivek Shandilya","raw_affiliation_strings":["University of Memphis, Memphis, TN, USA"],"affiliations":[{"raw_affiliation_string":"University of Memphis, Memphis, TN, USA","institution_ids":["https://openalex.org/I94658018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012148704","display_name":"Sajjan G. Shiva","orcid":"https://orcid.org/0000-0002-3996-7484"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sajjan Shiva","raw_affiliation_strings":["university of Memphis, Memphis, TN, USA"],"affiliations":[{"raw_affiliation_string":"university of Memphis, Memphis, TN, USA","institution_ids":["https://openalex.org/I94658018"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029787437"],"corresponding_institution_ids":["https://openalex.org/I94658018"],"apc_list":null,"apc_paid":null,"fwci":0.3328,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64786732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"159","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/perfect-information","display_name":"Perfect information","score":0.7945894002914429},{"id":"https://openalex.org/keywords/imperfect","display_name":"Imperfect","score":0.7679929733276367},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7599338293075562},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.59807288646698},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5133318305015564},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4578210115432739},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36896997690200806},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3659951686859131},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3629138767719269},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3222307860851288},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.17319217324256897},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15247932076454163},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10107964277267456}],"concepts":[{"id":"https://openalex.org/C123676819","wikidata":"https://www.wikidata.org/wiki/Q1074338","display_name":"Perfect information","level":2,"score":0.7945894002914429},{"id":"https://openalex.org/C2780310539","wikidata":"https://www.wikidata.org/wiki/Q12547192","display_name":"Imperfect","level":2,"score":0.7679929733276367},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7599338293075562},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.59807288646698},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5133318305015564},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4578210115432739},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36896997690200806},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3659951686859131},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3629138767719269},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3222307860851288},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.17319217324256897},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15247932076454163},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10107964277267456},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2699026.2699133","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2699026.2699133","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W58080111","https://openalex.org/W132944488","https://openalex.org/W157143398","https://openalex.org/W175417830","https://openalex.org/W300793427","https://openalex.org/W1481695999","https://openalex.org/W1496590343","https://openalex.org/W1534516911","https://openalex.org/W1767129432","https://openalex.org/W1964439345","https://openalex.org/W1968909445","https://openalex.org/W2044155094","https://openalex.org/W2057913812","https://openalex.org/W2128980432","https://openalex.org/W2133389234","https://openalex.org/W2138916466","https://openalex.org/W2149041900","https://openalex.org/W2157154136","https://openalex.org/W2165414132","https://openalex.org/W2165418237","https://openalex.org/W2207375515","https://openalex.org/W2397262397","https://openalex.org/W2964313867","https://openalex.org/W3210661238"],"related_works":["https://openalex.org/W2360321812","https://openalex.org/W2395295193","https://openalex.org/W3122057932","https://openalex.org/W2113798763","https://openalex.org/W3088364074","https://openalex.org/W2004230228","https://openalex.org/W2610227658","https://openalex.org/W2145796981","https://openalex.org/W2900431508","https://openalex.org/W2050340470"],"abstract_inverted_index":{"There":[0],"have":[1],"been":[2],"attempts":[3],"to":[4,33,53,57],"model":[5,28,41,68],"the":[6,61,65,85],"interaction":[7],"between":[8,82],"users,":[9],"both":[10],"malicious":[11],"and":[12,14],"benign,":[13],"network":[15],"administrators":[16],"as":[17],"games.":[18],"Building":[19],"on":[20],"such":[21,38],"works,":[22],"we":[23,78],"here":[24],"present":[25],"a":[26],"game":[27],"which":[29],"is":[30,51],"generic":[31],"enough":[32],"capture":[34],"various":[35],"modes":[36],"of":[37,60],"interactions.":[39],"The":[40,48],"facilitates":[42],"stochastic":[43],"games":[44],"with":[45],"imperfect":[46,49],"information.":[47],"information":[50],"due":[52],"erroneous":[54],"sensors":[55],"leading":[56],"incorrect":[58],"perception":[59,72],"current":[62],"state":[63],"by":[64],"players.":[66],"To":[67],"this":[69],"error":[70],"in":[71],"distributed":[73],"over":[74],"other":[75],"multiple":[76],"states,":[77],"use":[79],"Euclidean":[80],"distances":[81],"inputs":[83],"from":[84],"sensors.":[86]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
