{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:59:47Z","timestamp":1743109187616,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663982"},{"type":"electronic","value":"9783319663999"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66399-9_10","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T14:03:24Z","timestamp":1502460204000},"page":"174-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi-rate Threshold FlipThem"],"prefix":"10.1007","author":[{"given":"David","family":"Leslie","sequence":"first","affiliation":[]},{"given":"Chris","family":"Sherfield","sequence":"additional","affiliation":[]},{"given":"Nigel P.","family":"Smart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,12]]},"reference":[{"issue":"12","key":"10_CR1","doi-asserted-by":"publisher","first-page":"2389","DOI":"10.1002\/sec.949","volume":"7","author":"HS Bedi","year":"2014","unstructured":"Bedi, H.S., Shiva, S.G., Roy, S.: A game inspired defense mechanism against distributed denial of service attacks. Secur. Commun. Netw. 7(12), 2389\u20132404 (2014). doi:10.1002\/sec.949","journal-title":"Secur. Commun. Netw."},{"key":"10_CR2","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: Simon [33], pp. 1\u201310. http:\/\/doi.acm.org\/10.1145\/62212.62213"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1006\/game.1999.0717","volume":"29","author":"M Benaim","year":"1999","unstructured":"Benaim, M., Hirsch, M.W.: Mixed equilibria and dynamical systems arising from fictitious play in perturbed games. Games Econ. Behav. 29, 36\u201372 (1999)","journal-title":"Games Econ. Behav."},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11605805_15","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"D Boneh","year":"2006","unstructured":"Boneh, D., Boyen, X., Halevi, S.: Chosen ciphertext secure public key threshold encryption without random oracles. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 226\u2013243. Springer, Heidelberg (2006). doi:10.1007\/11605805_15"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., van Dijk, M., Griffin, R., Juels, A., Oprea, A., Rivest, R.L., Triandopoulos, N.: Defending against the unknown enemy: applying FlipIt to system security. In: Grossklags and Walrand [15], pp. 248\u2013263. http:\/\/dx.doi.org\/10.1007\/978-3-642-34266-0_15","DOI":"10.1007\/978-3-642-34266-0_15"},{"key":"10_CR6","unstructured":"Brown, G.: Iterative solution of games by fictitious play. In: Koopmans, T.C. (ed.) Activity Analysis of Production and Allocation, pp. 374\u2013376 (1951)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"\u00c7eker, H., Zhuang, J., Upadhyaya, S., La, Q.D., Soong, B.-H.: Deception-based game theoretical approach to mitigate DoS attacks. In: Zhu et al. [36], pp. 18\u201338 (2016). http:\/\/dx.doi.org\/10.1007\/978-3-319-47413-7_2","DOI":"10.1007\/978-3-319-47413-7_2"},{"key":"10_CR8","unstructured":"Chaum, D., Cr\u00e9peau, C., Damg\u00e5rd, I.: Multiparty unconditionally secure protocols (extended abstract). In: Simon [33], pp. 11\u201319. http:\/\/doi.acm.org\/10.1145\/62212.62214"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1002\/ett.4460050407","volume":"5","author":"Y Desmedt","year":"1994","unstructured":"Desmedt, Y.: Threshold cryptography. Eur. Trans. Telecommun. 5(4), 449\u2013458 (1994). doi:10.1002\/ett.4460050407","journal-title":"Eur. Trans. Telecommun."},{"issue":"4","key":"10_CR10","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s00145-012-9134-5","volume":"26","author":"M van Dijk","year":"2013","unstructured":"van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: the game of \u201cstealthy takeover\u201d. J. Cryptol. 26(4), 655\u2013713 (2013). doi:10.1007\/s00145-012-9134-5","journal-title":"J. Cryptol."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Farhang, S., Grossklags, J.: FlipLeakage: a game-theoretic approach to protect against stealthy attackers in the presence of information leakage. In: Zhu et al. [36], pp. 195\u2013214. http:\/\/dx.doi.org\/10.1007\/978-3-319-47413-7_12","DOI":"10.1007\/978-3-319-47413-7_12"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1006\/game.1993.1021","volume":"5","author":"D Fudenberg","year":"1993","unstructured":"Fudenberg, D., Kreps, D.: Learning mixed equilibria. Games Econ. Behav. 5, 320\u2013367 (1993)","journal-title":"Games Econ. Behav."},{"key":"10_CR13","volume-title":"The Theory of Learning in Games","author":"D Fudenberg","year":"1998","unstructured":"Fudenberg, D., Levine, D.K.: The Theory of Learning in Games, 1st edn. The MIT Press, Cambridge (1998)","edition":"1"},{"key":"10_CR14","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198572237.001.0001","volume-title":"Probability and Random Processes","author":"G Grimmett","year":"2001","unstructured":"Grimmett, G., Stirzaker, D.: Probability and Random Processes, 3rd edn. Oxford University Press, Oxford (2001)","edition":"3"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34266-0","volume-title":"Decision and Game Theory for Security","year":"2012","unstructured":"Grossklags, J., Walrand, J.C. (eds.): GameSec 2012. LNCS, vol. 7638. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-34266-0"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Hota, A.R., Clements, A.A., Sundaram, S., Bagchi, S.: Optimal and game-theoretic deployment of security investments in interdependent assets. In: Zhu et al. [36], pp. 101\u2013113. http:\/\/dx.doi.org\/10.1007\/978-3-319-47413-7_6","DOI":"10.1007\/978-3-319-47413-7_6"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Hu, P., Li, H., Fu, H., Cansever, D., Mohapatra, P.: Dynamic defense strategy against advanced persistent threat with insiders. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 747\u2013755. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218444"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Laszka, A., Horvath, G., Felegyhazi, M., Butty\u00e1n, L.: FlipThem: modeling targeted attacks with FlipIt for multiple resources. In: Poovendran and Saad [29], pp. 175\u2013194. http:\/\/dx.doi.org\/10.1007\/978-3-319-12601-2_10","DOI":"10.1007\/978-3-319-12601-2_10"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-45046-4_26","volume-title":"Web and Internet Economics","author":"A Laszka","year":"2013","unstructured":"Laszka, A., Johnson, B., Grossklags, J.: Mitigating covert compromises. In: Chen, Y., Immorlica, N. (eds.) WINE 2013. LNCS, vol. 8289, pp. 319\u2013332. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-45046-4_26"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-319-25594-1_5","volume-title":"Decision and Game Theory for Security","author":"D Leslie","year":"2015","unstructured":"Leslie, D., Sherfield, C., Smart, N.P.: Threshold FlipThem: when the winner does not need to take all. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 74\u201392. Springer, Cham (2015). doi:10.1007\/978-3-319-25594-1_5"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.geb.2005.08.005","volume":"56","author":"DS Leslie","year":"2006","unstructured":"Leslie, D.S., Collins, E.J.: Generalized weakened fictitious play. Games Econ. Behav. 56, 285\u2013298 (2006)","journal-title":"Games Econ. Behav."},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.ress.2011.11.001","volume":"99","author":"BZ Moayedi","year":"2012","unstructured":"Moayedi, B.Z., Azgomi, M.A.: A game theoretic framework for evaluation of the impacts of hackers diversity on security measures. Reliab. Eng. Syst. Saf. 99, 45\u201354 (2012). doi:10.1016\/j.ress.2011.11.001","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J Nash","year":"1951","unstructured":"Nash, J.: Non-cooperative games. Ann. Math. 54, 286\u2013295 (1951)","journal-title":"Ann. Math."},{"key":"10_CR24","unstructured":"Nochenson, A., Grossklags, J.: A behavioral investigation of the FlipIt game. In: Proceedings of the 12th Workshop on the Economics of Information Security (WEIS) (2013)"},{"key":"10_CR25","volume-title":"A Course in Game Theory","author":"M Osborne","year":"1994","unstructured":"Osborne, M., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Panaousis, E., Fielder, A., Malacaria, P., Hankin, C., Smeraldi, F.: Cybersecurity games and investments: a decision support approach. In: Poovendran and Saad [29], pp. 266\u2013286. http:\/\/dx.doi.org\/10.1007\/978-3-319-12601-2_15","DOI":"10.1007\/978-3-319-12601-2_15"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-319-25594-1_16","volume-title":"Decision and Game Theory for Security","author":"J Pawlick","year":"2015","unstructured":"Pawlick, J., Farhang, S., Zhu, Q.: Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 289\u2013308. Springer, Cham (2015). doi:10.1007\/978-3-319-25594-1_16"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Pham, V., Cid, C.: Are we compromised? Modelling security assessment games. In: Grossklags and Walrand [15], pp. 234\u2013247. http:\/\/dx.doi.org\/10.1007\/978-3-642-34266-0_14","DOI":"10.1007\/978-3-642-34266-0_14"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12601-2","volume-title":"Decision and Game Theory for Security","year":"2014","unstructured":"Poovendran, R., Saad, W. (eds.): GameSec 2014. LNCS, vol. 8840. Springer, Cham (2014). doi:10.1007\/978-3-319-12601-2"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Rass, S., Zhu, Q.: GADAPT: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats. In: Zhu et al. [36], pp. 314\u2013326. http:\/\/dx.doi.org\/10.1007\/978-3-319-47413-7_18","DOI":"10.1007\/978-3-319-47413-7_18"},{"issue":"11","key":"10_CR31","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). doi:10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"V Shoup","year":"2000","unstructured":"Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207\u2013220. Springer, Heidelberg (2000). doi:10.1007\/3-540-45539-6_15"},{"key":"10_CR33","unstructured":"Simon, J. (ed.): Proceedings of the 20th Annual ACM Symposium on Theory of Computing, Chicago, Illinois, USA, 2\u20134 May 1988. ACM (1988)"},{"issue":"9","key":"10_CR34","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1093\/comjnl\/bxq006","volume":"53","author":"M Smyrnakis","year":"2010","unstructured":"Smyrnakis, M., Leslie, D.S.: Dynamic opponent modelling in fictitious play. Comput. J. 53(9), 1344\u20131359 (2010)","journal-title":"Comput. J."},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Bambos, N., Glynn, P.: Dynamics on linear influence network games under stochastic environments. In: Zhu et al. [36], pp. 114\u2013126. http:\/\/dx.doi.org\/10.1007\/978-3-319-47413-7_7","DOI":"10.1007\/978-3-319-47413-7_7"},{"key":"10_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7","volume-title":"Decision and Game Theory for Security","year":"2016","unstructured":"Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.): GameSec 2016. LNCS, vol. 9996. Springer, Cham (2016). doi:10.1007\/978-3-319-47413-7"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66399-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T05:13:00Z","timestamp":1719378780000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-66399-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663982","9783319663999"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66399-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"12 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/deic.uab.cat\/conferences\/dpm\/dpm2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}