{"id":"https://openalex.org/W3090865155","doi":"https://doi.org/10.1155/2020/5381495","title":"Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game","display_name":"Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game","publication_year":2020,"publication_date":"2020-10-28","ids":{"openalex":"https://openalex.org/W3090865155","doi":"https://doi.org/10.1155/2020/5381495","mag":"3090865155"},"language":"en","primary_location":{"id":"doi:10.1155/2020/5381495","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/5381495","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/5381495.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/5381495.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100689572","display_name":"Xiaohu Liu","orcid":"https://orcid.org/0000-0001-9446-7426"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaohu Liu","raw_affiliation_strings":["Henan Key Laboratory of Information Security, Zhengzhou 450001, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou 450001, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047763068","display_name":"Hengwei Zhang","orcid":"https://orcid.org/0000-0002-1649-7336"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hengwei Zhang","raw_affiliation_strings":["Henan Key Laboratory of Information Security, Zhengzhou 450001, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou 450001, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100424320","display_name":"Yuchen Zhang","orcid":"https://orcid.org/0000-0002-7568-4959"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuchen Zhang","raw_affiliation_strings":["Henan Key Laboratory of Information Security, Zhengzhou 450001, China","State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Information Security, Zhengzhou 450001, China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012020651","display_name":"Lulu Shao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lulu Shao","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047763068"],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.9294,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.73859155,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11031","display_name":"Game Theory and Applications","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8021689653396606},{"id":"https://openalex.org/keywords/replicator-equation","display_name":"Replicator equation","score":0.5354620814323425},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5171388983726501},{"id":"https://openalex.org/keywords/evolutionarily-stable-strategy","display_name":"Evolutionarily stable strategy","score":0.5093885064125061},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4936009645462036},{"id":"https://openalex.org/keywords/evolutionary-game-theory","display_name":"Evolutionary game theory","score":0.4709140956401825},{"id":"https://openalex.org/keywords/network-formation","display_name":"Network formation","score":0.4464973211288452},{"id":"https://openalex.org/keywords/evolutionary-algorithm","display_name":"Evolutionary algorithm","score":0.4458077847957611},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4310302734375},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3528369665145874},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.16015633940696716},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.14305683970451355},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1096217930316925}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8021689653396606},{"id":"https://openalex.org/C50318809","wikidata":"https://www.wikidata.org/wiki/Q2145081","display_name":"Replicator equation","level":3,"score":0.5354620814323425},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5171388983726501},{"id":"https://openalex.org/C2519700","wikidata":"https://www.wikidata.org/wiki/Q1069992","display_name":"Evolutionarily stable strategy","level":3,"score":0.5093885064125061},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4936009645462036},{"id":"https://openalex.org/C20249471","wikidata":"https://www.wikidata.org/wiki/Q2298789","display_name":"Evolutionary game theory","level":3,"score":0.4709140956401825},{"id":"https://openalex.org/C68416499","wikidata":"https://www.wikidata.org/wiki/Q7001033","display_name":"Network formation","level":2,"score":0.4464973211288452},{"id":"https://openalex.org/C159149176","wikidata":"https://www.wikidata.org/wiki/Q14489129","display_name":"Evolutionary algorithm","level":2,"score":0.4458077847957611},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4310302734375},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3528369665145874},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.16015633940696716},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.14305683970451355},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1096217930316925},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/5381495","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/5381495","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/5381495.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8148f3575db94f368ce5d419bccae11f","is_oa":true,"landing_page_url":"https://doaj.org/article/8148f3575db94f368ce5d419bccae11f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/5381495","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/5381495","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/5381495.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1800439047","display_name":null,"funder_award_id":"192102210293","funder_id":"https://openalex.org/F4320336593","funder_display_name":"Henan Provincial Science and Technology Research Project"},{"id":"https://openalex.org/G8751209418","display_name":null,"funder_award_id":"182102210144","funder_id":"https://openalex.org/F4320336593","funder_display_name":"Henan Provincial Science and Technology Research Project"}],"funders":[{"id":"https://openalex.org/F4320336593","display_name":"Henan Provincial Science and Technology Research Project","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3090865155.pdf","grobid_xml":"https://content.openalex.org/works/W3090865155.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1564092663","https://openalex.org/W2314020383","https://openalex.org/W2320597598","https://openalex.org/W2320964920","https://openalex.org/W2473503942","https://openalex.org/W2517046199","https://openalex.org/W2529866846","https://openalex.org/W2535610796","https://openalex.org/W2604409140","https://openalex.org/W2612172766","https://openalex.org/W2757535399","https://openalex.org/W2799083256","https://openalex.org/W2803917243","https://openalex.org/W2806064618","https://openalex.org/W2809199914","https://openalex.org/W2889626086","https://openalex.org/W2899705102","https://openalex.org/W2913960061","https://openalex.org/W2933652705","https://openalex.org/W4205655685","https://openalex.org/W4211095127","https://openalex.org/W4375906334","https://openalex.org/W6761472802"],"related_works":["https://openalex.org/W2327098548","https://openalex.org/W185532251","https://openalex.org/W1593767881","https://openalex.org/W1570170279","https://openalex.org/W2058265801","https://openalex.org/W4241847945","https://openalex.org/W4297224686","https://openalex.org/W2357408681","https://openalex.org/W1973788147","https://openalex.org/W2370768682"],"abstract_inverted_index":{"The":[0,17,43,191],"basic":[1],"hypothesis":[2],"of":[3,20,71,126,151,175,193,208,215],"evolutionary":[4,47,167,173,213],"game":[5,13,48,88,169],"theory":[6],"is":[7,198],"that":[8,29,59],"the":[9,12,35,60,65,69,84,87,108,113,117,123,127,130,135,139,149,155,172,181,194,205,209,212,216],"players":[10,21,63,85,210],"in":[11,33,39,64,76,86,154],"possess":[14],"limited":[15,90,101],"rationality.":[16],"interactive":[18],"behavior":[19],"can":[22,94],"be":[23],"described":[24],"by":[25,200],"a":[26,40,52,100,186],"learning":[27,55,91,109,118,124,140,156],"mechanism":[28,56,110],"has":[30],"theoretical":[31],"advantages":[32],"modeling":[34],"network":[36,45,79,114,168],"security":[37,46],"problem":[38],"real":[41],"society.":[42],"current":[44],"model":[49,195],"generally":[50],"adopts":[51],"replicator":[53],"dynamic":[54],"and":[57,81,93,143,165,177,184,196,211],"assumes":[58],"interaction":[61],"between":[62],"group":[66,218],"conforms":[67],"to":[68,133,138,147],"characteristics":[70],"uniform":[72],"mixed":[73],"distribution.":[74],"However,":[75],"an":[77,163],"actual":[78],"attack":[80,164,176],"defense":[82,166,178,187,217],"scenario,":[83],"have":[89],"capability":[92],"only":[95],"interact":[96],"with":[97],"others":[98],"within":[99],"range.":[102],"To":[103],"address":[104],"this,":[105],"we":[106,161],"improved":[107],"based":[111,121],"on":[112,122],"topology,":[115],"established":[116],"object":[119,141],"set":[120],"range":[125],"players,":[128],"used":[129],"Fermi":[131],"function":[132],"calculate":[134],"transition":[136,206],"probability":[137,207],"strategy,":[142,179],"employed":[144],"random":[145],"noise":[146],"describe":[148],"degree":[150],"irrational":[152],"influence":[153],"process.":[157],"On":[158],"this":[159],"basis,":[160],"built":[162],"model,":[170],"analyzed":[171],"process":[174,214],"solved":[180],"evolution":[182],"equilibrium,":[183],"designed":[185],"strategy":[188],"selection":[189],"algorithm.":[190],"effectiveness":[192],"method":[197],"verified":[199],"conducting":[201],"simulation":[202],"experiments":[203],"for":[204],"strategy.":[219]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
