{"id":"https://openalex.org/W2890591867","doi":"https://doi.org/10.1145/3314058.3314063","title":"Game theory for adaptive defensive cyber deception","display_name":"Game theory for adaptive defensive cyber deception","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2890591867","doi":"https://doi.org/10.1145/3314058.3314063","mag":"2890591867"},"language":"en","primary_location":{"id":"doi:10.1145/3314058.3314063","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3314058.3314063","pdf_url":null,"source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059840684","display_name":"Kimberly Ferguson\u2010Walter","orcid":"https://orcid.org/0000-0001-5108-4599"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kimberly Ferguson-Walter","raw_affiliation_strings":["Department of Defense"],"affiliations":[{"raw_affiliation_string":"Department of Defense","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050187102","display_name":"Sunny Fugate","orcid":"https://orcid.org/0000-0002-6733-3219"},"institutions":[{"id":"https://openalex.org/I1339224429","display_name":"Naval Information Warfare Center Pacific","ror":"https://ror.org/01gs1cg95","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330347796","https://openalex.org/I1339224429","https://openalex.org/I2802223155","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sunny Fugate","raw_affiliation_strings":["SPAWAR System Center Pacific"],"affiliations":[{"raw_affiliation_string":"SPAWAR System Center Pacific","institution_ids":["https://openalex.org/I1339224429"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086900754","display_name":"Justin Mauger","orcid":"https://orcid.org/0000-0001-7295-2818"},"institutions":[{"id":"https://openalex.org/I1339224429","display_name":"Naval Information Warfare Center Pacific","ror":"https://ror.org/01gs1cg95","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330347796","https://openalex.org/I1339224429","https://openalex.org/I2802223155","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Justin Mauger","raw_affiliation_strings":["SPAWAR System Center Pacific"],"affiliations":[{"raw_affiliation_string":"SPAWAR System Center Pacific","institution_ids":["https://openalex.org/I1339224429"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048213939","display_name":"Maxine Major","orcid":"https://orcid.org/0000-0003-2233-9411"},"institutions":[{"id":"https://openalex.org/I1339224429","display_name":"Naval Information Warfare Center Pacific","ror":"https://ror.org/01gs1cg95","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330347796","https://openalex.org/I1339224429","https://openalex.org/I2802223155","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maxine Major","raw_affiliation_strings":["SPAWAR System Center Pacific"],"affiliations":[{"raw_affiliation_string":"SPAWAR System Center Pacific","institution_ids":["https://openalex.org/I1339224429"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059840684"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3566,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.85234553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9653000235557556,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.9693123698234558},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.91193687915802},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6057236194610596},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.5779544115066528},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4635345935821533},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.448606014251709},{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.42019712924957275},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.37006890773773193},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.34096547961235046}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.9693123698234558},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.91193687915802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6057236194610596},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.5779544115066528},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4635345935821533},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.448606014251709},{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.42019712924957275},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.37006890773773193},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.34096547961235046}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3314058.3314063","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3314058.3314063","pdf_url":null,"source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security","raw_type":"proceedings-article"},{"id":"mag:2890591867","is_oa":false,"landing_page_url":"https://www.hsdl.org/?abstract&did=815861","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.699999988079071,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1613919729","https://openalex.org/W2107927428","https://openalex.org/W2110092041","https://openalex.org/W2120839938","https://openalex.org/W2320597598","https://openalex.org/W2482678392","https://openalex.org/W2484995704","https://openalex.org/W2494110282","https://openalex.org/W2523738226","https://openalex.org/W2527986897","https://openalex.org/W2930946359"],"related_works":["https://openalex.org/W2951174687","https://openalex.org/W3045763553","https://openalex.org/W3005518632","https://openalex.org/W299870473","https://openalex.org/W3004681733","https://openalex.org/W3035021360","https://openalex.org/W1616179507","https://openalex.org/W3121407127","https://openalex.org/W2794694510","https://openalex.org/W1900128677","https://openalex.org/W2407300255","https://openalex.org/W2741835886","https://openalex.org/W3124895604","https://openalex.org/W2003043151","https://openalex.org/W1538201405","https://openalex.org/W2795682744","https://openalex.org/W2523652134","https://openalex.org/W2178180755","https://openalex.org/W2135507518","https://openalex.org/W2551207969"],"abstract_inverted_index":{"As":[0],"infamous":[1],"hacker":[2],"Kevin":[3],"Mitnick":[4],"describes":[5],"in":[6,38],"his":[7],"book":[8],"The":[9],"Art":[10],"of":[11],"Deception,":[12],"\"the":[13],"human":[14],"factor":[15],"is":[16,55],"truly":[17],"security's":[18],"weakest":[19],"link\"":[20],"[18].":[21],"Deception":[22,42],"has":[23],"been":[24],"widely":[25],"successful":[26],"when":[27],"used":[28],"by":[29,35],"hackers":[30],"for":[31],"social":[32],"engineering":[33],"and":[34,48,74],"military":[36],"strategists":[37],"kinetic":[39],"warfare":[40],"[26].":[41],"affects":[43],"the":[44],"human's":[45],"beliefs,":[46],"decisions,":[47],"behaviors.":[49],"Similarly,":[50],"as":[51],"cyber":[52],"defenders,":[53],"deception":[54],"a":[56],"powerful":[57],"tool":[58],"that":[59],"should":[60],"be":[61],"employed":[62],"to":[63,71],"protect":[64],"our":[65],"systems":[66],"against":[67],"humans":[68],"who":[69],"wish":[70],"penetrate,":[72],"attack,":[73],"harm":[75],"them.":[76]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
