{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T11:28:03Z","timestamp":1725190083480},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,2,22]],"date-time":"2018-02-22T00:00:00Z","timestamp":1519257600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002261","name":"Russian Foundation for Basic Research","doi-asserted-by":"publisher","award":["No 14-06-00326","17-01-00069"],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Game Theory"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s00182-018-0614-1","type":"journal-article","created":{"date-parts":[[2018,2,22]],"date-time":"2018-02-22T15:16:54Z","timestamp":1519312614000},"page":"977-999","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Corruption and botnet defense: a mean field game approach"],"prefix":"10.1007","volume":"47","author":[{"given":"V. N.","family":"Kolokoltsov","sequence":"first","affiliation":[]},{"given":"O. A.","family":"Malafeyev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,22]]},"reference":[{"issue":"491","key":"614_CR1","doi-asserted-by":"publisher","first-page":"F632","DOI":"10.1046\/j.0013-0133.2003.00171.x","volume":"113","author":"TS Aidt","year":"2009","unstructured":"Aidt TS (2009) Economic analysis of corruption: a survey. Econ J 113(491):F632\u2013F652","journal-title":"Econ J"},{"key":"614_CR2","doi-asserted-by":"publisher","unstructured":"Alferov GV, Malafeyev OA, Maltseva AS (2015) Programming the robot in tasks of inspection and interception. In: International conference on mechanics\u2014seventh Polyakhovs reading. conference proceedings, pp 1\u20133. https:\/\/doi.org\/10.1109\/Polyakhov.2015.7106713","DOI":"10.1109\/Polyakhov.2015.7106713"},{"issue":"4","key":"614_CR3","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s13235-013-0098-3","volume":"3","author":"M Bardi","year":"2013","unstructured":"Bardi M, Caines P, Dolcetta I Capuzzo (2013) Preface: DGAA special issue on mean field games. Dyn Games Appl 3(4):443\u2013445","journal-title":"Dyn Games Appl"},{"issue":"4","key":"614_CR4","first-page":"449","volume":"8","author":"R Basna","year":"2014","unstructured":"Basna R, Hilbert A, Kolokoltsov V (2014) An epsilon-Nash equilibrium for non-linear Markov games of mean-field-type on finite spaces. Commun Stoch Anal 8(4):449\u2013468","journal-title":"Commun Stoch Anal"},{"key":"614_CR5","first-page":"135","volume-title":"Lecture Notes in Computer Science","author":"Alain Bensoussan","year":"2010","unstructured":"Bensoussan A, Hoe S, Kantarcioglu M (2010) A game-theoretical approach for finding optimal strategies in a botnet defense model. In: Alpcan T, Buttyan L, Baras J (eds) Decision and game theory for security first international conference, GameSec. Berlin, Germany, November 22\u201323, 2010. Proceeding, vol 6442, pp 135\u2013148"},{"key":"614_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8508-7","volume-title":"Mean field games and mean field type control theory","author":"A Bensoussan","year":"2013","unstructured":"Bensoussan A, Frehse J, Yam P (2013) Mean field games and mean field type control theory. Springer, Berlin"},{"key":"614_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5102-930-1","volume-title":"Encyclopedia of systems and control. Springer Reference 364780","author":"PE Caines","year":"2014","unstructured":"Caines PE (2014) Mean field games. In: Samad T, Ballieul J (eds) Encyclopedia of systems and control. Springer Reference 364780. Springer, London. https:\/\/doi.org\/10.1007\/978-1-4471-5102-930-1"},{"issue":"5","key":"614_CR8","doi-asserted-by":"publisher","first-page":"3558","DOI":"10.1137\/120904184","volume":"51","author":"P Cardaliaguet","year":"2013","unstructured":"Cardaliaguet P, Lasry J-M, Lions P-L, Porretta A (2013) Long time average of mean field games with a nonlocal coupling. SIAM J Control Optim 51(5):3558\u20133591","journal-title":"SIAM J Control Optim"},{"key":"614_CR9","doi-asserted-by":"publisher","first-page":"2705","DOI":"10.1137\/120883499","volume":"514","author":"R Carmona","year":"2013","unstructured":"Carmona R, Delarue F (2013) Probabilistic analysis of mean-field games. SIAM J Control Optim 514:2705\u20132734","journal-title":"SIAM J Control Optim"},{"issue":"2","key":"614_CR10","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/s13235-013-0099-2","volume":"4","author":"DA Gomes","year":"2014","unstructured":"Gomes DA, Saude J (2014) Mean field games models\u2014a brief survey. Dyn Games Appl 4(2):110\u2013154","journal-title":"Dyn Games Appl"},{"key":"614_CR11","doi-asserted-by":"crossref","first-page":"221","DOI":"10.4310\/CIS.2006.v6.n2.a2","volume":"6","author":"M Huang","year":"2006","unstructured":"Huang M, Malham\u00e9 R, Caines P (2006) Large population stochastic dynamic games: closed-loop Mckean\u2013Vlasov systems and the Nash certainty equivalence principle. Commun Inf Syst 6:221\u2013252","journal-title":"Commun Inf Syst"},{"issue":"1","key":"614_CR12","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1111\/1467-6419.00133","volume":"15","author":"AK Jain","year":"2001","unstructured":"Jain AK (2001) Corruption: a review. J Econ Surv 15(1):71\u2013121","journal-title":"J Econ Surv"},{"issue":"4","key":"614_CR13","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3390\/g7040031","volume":"7","author":"Stamatios Katsikas","year":"2016","unstructured":"Katsikas S, Kolokoltsov V, Yang W (2016) Evolutionary inspection and corruption games. Games (MDPI J) 7(4):31. https:\/\/doi.org\/10.3390\/g7040031 . http:\/\/www.mdpi.com\/2073-4336\/7\/4\/31\/html","journal-title":"Games"},{"key":"614_CR14","doi-asserted-by":"crossref","unstructured":"Kolokoltsov VN (2012) Nonlinear Markov games on a finite state space (mean-field and binary interactions). Int J Stat Probab 1(1):77\u201391. http:\/\/www.ccsenet.org\/journal\/index.php\/ijsp\/article\/view\/16682","DOI":"10.5539\/ijsp.v1n1p77"},{"key":"614_CR15","unstructured":"Kolokoltsov VN (2014) The evolutionary game of pressure (or interference), resistance and collaboration. MOR (Math Oper Res). http:\/\/pubsonline.informs.org\/doi\/full\/10.1287\/moor.2016.0838 . Articles Adv. arXiv:1412.1269"},{"issue":"3","key":"614_CR16","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1007\/s00245-016-9389-6","volume":"74","author":"V. N. Kolokoltsov","year":"2016","unstructured":"Kolokoltsov VN, Bensoussan A (2015) Mean-field-game model of botnet defense in cyber-security. AMO (Appl Math Optim) 74(3):669\u2013692. arXiv:1511.06642","journal-title":"Applied Mathematics & Optimization"},{"issue":"1","key":"614_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s13235-015-0175-x","volume":"7","author":"V. N. Kolokoltsov","year":"2015","unstructured":"Kolokoltsov VN, Malafeyev (2017) Mean field game model of corruption (2015). Dyn Games Appl. 7(1):34\u201347. arXiv:1507.03240 . Published Online 16 Nov 2015 (Open Access mode)","journal-title":"Dynamic Games and Applications"},{"issue":"3","key":"614_CR18","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/s13235-012-0047-6","volume":"2","author":"V Kolokoltsov","year":"2012","unstructured":"Kolokoltsov V, Yang W (2012) The turnpike theorems for Markov games. Dyn Games Appl 2(3):294\u2013312","journal-title":"Dyn Games Appl"},{"issue":"9","key":"614_CR19","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.crma.2006.09.019","volume":"343","author":"J-M Lasry","year":"2006","unstructured":"Lasry J-M, Lions P-L (2006) Jeux \u00e0 champ moyen. I. Le cas stationnaire (French). CR Math Acad Sci Paris 343(9):619\u2013625","journal-title":"CR Math Acad Sci Paris"},{"issue":"4","key":"614_CR20","first-page":"34","volume":"34","author":"MI Levin","year":"1998","unstructured":"Levin MI, Tsirik ML (1998) Mathematical modeling of corruption (in Russian). Ekon i Matem Metody 34(4):34\u201355","journal-title":"Ekon i Matem Metody"},{"key":"614_CR21","doi-asserted-by":"crossref","unstructured":"Li Z, Liao Q, Striegel A (2009) Botnet economics: uncertainty matters. http:\/\/weis2008.econinfosec.org\/papers\/Liao.pdf","DOI":"10.1007\/978-0-387-09762-6_12"},{"key":"614_CR22","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10207-004-0060-x","volume":"4","author":"K-W Lye","year":"2005","unstructured":"Lye K-W, Wing JM (2005) Game strategies in network security. Int J Inf Secur 4:71\u201386","journal-title":"Int J Inf Secur"},{"key":"614_CR23","doi-asserted-by":"publisher","unstructured":"Malafeyev OA, Redinskikh ND, Alferov GV (2014) Electric circuits analogies in economics modeling: corruption networks. In: Second international conference on emission electronics proceeding, pp 28\u201332. https:\/\/doi.org\/10.1109\/Emission.2014.6893965","DOI":"10.1109\/Emission.2014.6893965"},{"issue":"7","key":"614_CR24","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1080\/00029890.1972.11993115","volume":"79","author":"RM Redheffer","year":"1972","unstructured":"Redheffer RM (1972) The theorems of Bony and Brezis on flow-invariant sets. Am Math Mon 79(7):740\u2013747","journal-title":"Am Math Mon"},{"key":"614_CR25","volume-title":"Turnpike properties in the calculus of variations and optimal control","author":"AJ Zaslavski","year":"2006","unstructured":"Zaslavski AJ (2006) Turnpike properties in the calculus of variations and optimal control. Springer, New York"}],"container-title":["International Journal of Game Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00182-018-0614-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00182-018-0614-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00182-018-0614-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T18:33:16Z","timestamp":1660501996000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00182-018-0614-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,22]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["614"],"URL":"https:\/\/doi.org\/10.1007\/s00182-018-0614-1","relation":{},"ISSN":["0020-7276","1432-1270"],"issn-type":[{"value":"0020-7276","type":"print"},{"value":"1432-1270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,22]]},"assertion":[{"value":"13 February 2018","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2018","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}