{"id":"https://openalex.org/W3033205445","doi":"https://doi.org/10.1155/2020/3417039","title":"Study on Stochastic Differential Game Model in Network Attack and Defense","display_name":"Study on Stochastic Differential Game Model in Network Attack and Defense","publication_year":2020,"publication_date":"2020-06-08","ids":{"openalex":"https://openalex.org/W3033205445","doi":"https://doi.org/10.1155/2020/3417039","mag":"3033205445"},"language":"en","primary_location":{"id":"doi:10.1155/2020/3417039","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/3417039","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/3417039.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/3417039.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018771919","display_name":"Xiaotong Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaotong Xu","raw_affiliation_strings":["School of Computer, Electronics, and Information, Guangxi University, Nanning, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Electronics, and Information, Guangxi University, Nanning, China","institution_ids":["https://openalex.org/I150807315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067548143","display_name":"Gaocai Wang","orcid":"https://orcid.org/0000-0003-3016-9037"},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gaocai Wang","raw_affiliation_strings":["School of Computer, Electronics, and Information, Guangxi University, Nanning, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Electronics, and Information, Guangxi University, Nanning, China","institution_ids":["https://openalex.org/I150807315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101134655","display_name":"Jintian Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jintian Hu","raw_affiliation_strings":["School of Computer, Electronics, and Information, Guangxi University, Nanning, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Electronics, and Information, Guangxi University, Nanning, China","institution_ids":["https://openalex.org/I150807315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059560149","display_name":"Yuting L\u00fc","orcid":"https://orcid.org/0000-0001-7632-2928"},"institutions":[{"id":"https://openalex.org/I150807315","display_name":"Guangxi University","ror":"https://ror.org/02c9qn167","country_code":"CN","type":"education","lineage":["https://openalex.org/I150807315"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuting Lu","raw_affiliation_strings":["School of Computer, Electronics, and Information, Guangxi University, Nanning, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Electronics, and Information, Guangxi University, Nanning, China","institution_ids":["https://openalex.org/I150807315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067548143"],"corresponding_institution_ids":["https://openalex.org/I150807315"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.4662,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.8161674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7856270670890808},{"id":"https://openalex.org/keywords/differential-game","display_name":"Differential game","score":0.6240601539611816},{"id":"https://openalex.org/keywords/stochastic-differential-equation","display_name":"Stochastic differential equation","score":0.5392969250679016},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.48854193091392517},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.4785119295120239},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.467856228351593},{"id":"https://openalex.org/keywords/evolutionary-game-theory","display_name":"Evolutionary game theory","score":0.45210617780685425},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.4254436790943146},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.41782698035240173},{"id":"https://openalex.org/keywords/repeated-game","display_name":"Repeated game","score":0.4165623188018799},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.41005706787109375},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.29968172311782837},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2348296344280243},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15202781558036804},{"id":"https://openalex.org/keywords/applied-mathematics","display_name":"Applied mathematics","score":0.12378409504890442},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.12070050835609436}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7856270670890808},{"id":"https://openalex.org/C2779006483","wikidata":"https://www.wikidata.org/wiki/Q1973196","display_name":"Differential game","level":2,"score":0.6240601539611816},{"id":"https://openalex.org/C51955184","wikidata":"https://www.wikidata.org/wiki/Q1545585","display_name":"Stochastic differential equation","level":2,"score":0.5392969250679016},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.48854193091392517},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.4785119295120239},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.467856228351593},{"id":"https://openalex.org/C20249471","wikidata":"https://www.wikidata.org/wiki/Q2298789","display_name":"Evolutionary game theory","level":3,"score":0.45210617780685425},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.4254436790943146},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.41782698035240173},{"id":"https://openalex.org/C202556891","wikidata":"https://www.wikidata.org/wiki/Q1584646","display_name":"Repeated game","level":3,"score":0.4165623188018799},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.41005706787109375},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.29968172311782837},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2348296344280243},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15202781558036804},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.12378409504890442},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.12070050835609436},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/3417039","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/3417039","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/3417039.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:13c47e39bc2a434a946f11bdeee9aed5","is_oa":true,"landing_page_url":"https://doaj.org/article/13c47e39bc2a434a946f11bdeee9aed5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/3417039","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/3417039","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/3417039.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2251995173","display_name":null,"funder_award_id":"61562006","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"},{"id":"https://openalex.org/G2702447171","display_name":null,"funder_award_id":"61562006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3433402576","display_name":null,"funder_award_id":"6156200","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3575621934","display_name":null,"funder_award_id":"2016GXNSF","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G773107749","display_name":null,"funder_award_id":"2016GXNSFBA380181","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7755781589","display_name":null,"funder_award_id":"2016GXNSFBA380181","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322768","display_name":"Natural Science Foundation of Guangxi Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3033205445.pdf","grobid_xml":"https://content.openalex.org/works/W3033205445.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W824788943","https://openalex.org/W2021125080","https://openalex.org/W2028798910","https://openalex.org/W2042391506","https://openalex.org/W2172232139","https://openalex.org/W2255182928","https://openalex.org/W2323149891","https://openalex.org/W2328795218","https://openalex.org/W2346757583","https://openalex.org/W2502280356","https://openalex.org/W2751473477","https://openalex.org/W2773104559","https://openalex.org/W2789266794","https://openalex.org/W2792653931","https://openalex.org/W2806064618"],"related_works":["https://openalex.org/W2228513190","https://openalex.org/W2601906167","https://openalex.org/W4386821009","https://openalex.org/W2962927879","https://openalex.org/W2388808575","https://openalex.org/W2505734641","https://openalex.org/W3144554261","https://openalex.org/W2131463044","https://openalex.org/W2801573479","https://openalex.org/W2374666693"],"abstract_inverted_index":{"In":[0,57,157],"recent":[1],"years,":[2],"evolutionary":[3,64,76,131],"game":[4,24,65,132],"theory":[5],"has":[6],"been":[7],"gradually":[8],"applied":[9],"to":[10,38,93,109],"analyze":[11,110],"and":[12,16,35,46,84,143,179,186,198],"predict":[13],"network":[14,33,196],"attack":[15,34,197],"defense":[17,36,147],"for":[18,120,194],"maintaining":[19],"cybersecurity.":[20],"The":[21,75,124],"traditional":[22],"deterministic":[23],"model":[25,66,81,89,133,176,190],"cannot":[26],"accurately":[27],"describe":[28],"the":[29,41,51,55,68,80,85,88,94,97,104,111,114,118,129,145,150,153,169,180,184],"process":[30],"of":[31,43,54,79,87,96,113,117,152,163,174,183],"actual":[32,195],"due":[37],"changing":[39],"in":[40,135,188],"set":[42],"attack-defense":[44],"strategies":[45],"external":[47],"factors":[48],"(such":[49],"as":[50],"operating":[52],"environment":[53],"system).":[56],"this":[58,136,175],"paper,":[59],"we":[60,102,165],"construct":[61],"a":[62,140],"stochastic":[63,69,98,130,154],"by":[67],"differential":[70,99],"equation":[71],"with":[72,160],"Markov":[73],"property.":[74],"equilibrium":[77],"solution":[78],"is":[82,90,177,191],"found":[83],"stability":[86],"proved":[91],"according":[92],"knowledge":[95],"equation.":[100],"And":[101],"apply":[103],"explicit":[105],"Euler":[106],"numerical":[107],"method":[108],"evolution":[112],"strategy":[115,148,181],"selection":[116,182],"players":[119],"different":[121],"problem":[122],"situations.":[123],"simulation":[125],"results":[126],"show":[127],"that":[128,168],"proposed":[134],"paper":[137],"can":[138,166],"get":[139],"steady":[141],"state":[142],"obtain":[144],"optimal":[146],"under":[149],"action":[151],"disturbance":[155],"factor.":[156],"addition,":[158],"compared":[159],"other":[161],"kinds":[162],"literature,":[164],"conclude":[167],"return":[170],"on":[171],"security":[172],"investment":[173],"better,":[178],"attackers":[185],"defenders":[187],"our":[189],"more":[192],"suitable":[193],"defense.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
