{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T07:12:12Z","timestamp":1726470732833},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100006463","name":"Bavarian Ministry of Economic Affairs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006463","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1016\/j.cose.2019.101575","type":"journal-article","created":{"date-parts":[[2019,7,27]],"date-time":"2019-07-27T14:50:09Z","timestamp":1564239009000},"page":"101575","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Quasi-purification of mixed game strategies: Sub-optimality of equilibria in security games"],"prefix":"10.1016","volume":"87","author":[{"given":"Ali","family":"Alshawish","sequence":"first","affiliation":[]},{"given":"Mohamed Amine","family":"Abid","sequence":"additional","affiliation":[]},{"given":"Hermann","family":"de Meer","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2019.101575_bib0001","series-title":"Workshop on Novel Approaches in Risk and Security Management for Critical Infrastructures","first-page":"117","article-title":"Simulating physical intrusion attacks in critical infrastructures","author":"Abid","year":"2017"},{"year":"2010","series-title":"Network Security: A Decision and Game Theoretic Approach","author":"Alpcan","key":"10.1016\/j.cose.2019.101575_bib0002"},{"key":"10.1016\/j.cose.2019.101575_bib0003","series-title":"Game Theory for Security and Risk Management: From Theory to Practice","first-page":"353","article-title":"Game-theoretic optimization for physical surveillance of critical infrastructures: a case study","author":"Alshawish","year":"2018"},{"key":"10.1016\/j.cose.2019.101575_bib0004","series-title":"Game Theory for Security and Risk Management: From Theory to Practice","first-page":"129","article-title":"G-DPS: a game-theoretical decision-making framework for physical surveillance games","author":"Alshawish","year":"2018"},{"key":"10.1016\/j.cose.2019.101575_bib0005","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.cor.2004.06.005","article-title":"A survey on networking games in telecommunications","volume":"33","author":"Altman","year":"2006","journal-title":"Els. J. Comput. Oper. Res."},{"year":"2002","series-title":"Handbook of Game Theory with Economic Applications, Handbook of Game Theory with Economic Applications","key":"10.1016\/j.cose.2019.101575_bib0006"},{"issue":"1","key":"10.1016\/j.cose.2019.101575_bib0007","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/opre.33.1.1","article-title":"Disappointment in decision making under uncertainty","volume":"33","author":"Bell","year":"1985","journal-title":"Oper. Res."},{"issue":"3","key":"10.1016\/j.cose.2019.101575_bib0008","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s11166-007-9009-6","article-title":"Stochastic expected utility theory","volume":"34","author":"Blavatskyy","year":"2007","journal-title":"J. Risk Uncertain."},{"year":"2016","series-title":"INET Framework: An Open-Source Omnet++ Model Suite for Wired, Wireless and Mobile Networks","author":"Bojthe","key":"10.1016\/j.cose.2019.101575_sbref0009"},{"year":"2012","series-title":"Subjective Risk and Disappointment","author":"Chauveau","key":"10.1016\/j.cose.2019.101575_sbref0010"},{"year":"2005","series-title":"A Theory of Disappointment","author":"Chauveau","key":"10.1016\/j.cose.2019.101575_sbref0011"},{"key":"10.1016\/j.cose.2019.101575_bib0012","series-title":"Decision and Game Theory for Security","first-page":"319","article-title":"A dynamic Bayesian security game framework for strategic defense mechanism design","volume":"8840","author":"Farhang","year":"2014"},{"key":"10.1016\/j.cose.2019.101575_bib0013","series-title":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","first-page":"858","article-title":"Visualization in multiobjective optimization","author":"Filipi\u010d","year":"2018"},{"year":"1991","series-title":"Game Theory","author":"Fudenberg","key":"10.1016\/j.cose.2019.101575_bib0014"},{"issue":"1","key":"10.1016\/j.cose.2019.101575_bib0015","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/0261-3794(91)90004-C","article-title":"Proportionality, disproportionality and electoral systems","volume":"10","author":"Gallagher","year":"1991","journal-title":"Electoral Stud."},{"key":"10.1016\/j.cose.2019.101575_bib0016","series-title":"The Fields-MITACS Industrial Problems Workshop","article-title":"Normalization and other topics in multi-objective optimization","author":"Grodzevich","year":"2006"},{"issue":"1","key":"10.1016\/j.cose.2019.101575_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF01737554","article-title":"Games with randomly disturbed payoffs: a new rationale for mixed-strategy equilibrium points","volume":"2","author":"Harsanyi","year":"1973","journal-title":"Int. J. Game Theory"},{"year":"2013","series-title":"Moving Target Defense II \u2013 Application of Game Theory and Adversarial Modeling, Advances in Information Security, vol. 100","key":"10.1016\/j.cose.2019.101575_bib0018"},{"issue":"2","key":"10.1016\/j.cose.2019.101575_bib0019","doi-asserted-by":"crossref","first-page":"263","DOI":"10.2307\/1914185","article-title":"Prospect theory: an analysis of decision under risk","volume":"47","author":"Kahneman","year":"1979","journal-title":"Econometrica"},{"issue":"49","key":"10.1016\/j.cose.2019.101575_bib0020","first-page":"115","article-title":"Multiobjective games and determining Pareto-nash equilibria","volume":"3","author":"Lozovanu","year":"2005","journal-title":"Buletinul Academiei de Stiinte a Republicii Moldova Matematica"},{"key":"10.1016\/j.cose.2019.101575_bib0021","series-title":"Conference of the Spanish Association for Artificial Intelligence","first-page":"1","article-title":"An evaluation of best compromise search in graphs","author":"Machuca","year":"2013"},{"issue":"3","key":"10.1016\/j.cose.2019.101575_bib0022","doi-asserted-by":"crossref","first-page":"25:1","DOI":"10.1145\/2480741.2480742","article-title":"Game theory meets network security and privacy","volume":"45","author":"Manshaei","year":"2013","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"10.1016\/j.cose.2019.101575_bib0023","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1006\/game.1995.1023","article-title":"Quantal response equilibria for normal form games","volume":"10","author":"McKelvey","year":"1995","journal-title":"Games Econ. Behav."},{"issue":"5","key":"10.1016\/j.cose.2019.101575_bib0024","first-page":"1313","article-title":"Unraveling in guessing games: an experimental study","volume":"85","author":"Nagel","year":"1995","journal-title":"Am. Econ. Rev."},{"issue":"1","key":"10.1016\/j.cose.2019.101575_bib0025","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10922-012-9229-1","article-title":"On game-theoretic network security provisioning","volume":"21","author":"Rass","year":"2013","journal-title":"Springer J. Netw. Syst. Manag."},{"year":"2017","series-title":"R Package \u2019Hyrim\u2019: Multicriteria Risk Management using Zero-Sum Games with Vector-Valued Payoffs that are Probability Distributions","author":"Rass","key":"10.1016\/j.cose.2019.101575_sbref0026"},{"key":"10.1016\/j.cose.2019.101575_bib0027","series-title":"Decision and Game Theory for Security, 6th International Conference, GameSec 2015","article-title":"Uncertainty in games: using probability distributions as payoffs: 346\u2013357","author":"Rass","year":"2015"},{"issue":"12","key":"10.1016\/j.cose.2019.101575_bib0028","doi-asserted-by":"crossref","first-page":"e0168583","DOI":"10.1371\/journal.pone.0168583","article-title":"Decisions with uncertain consequences-a total ordering on loss-distributions","volume":"11","author":"Rass","year":"2016","journal-title":"PLoS ONE"},{"issue":"1","key":"10.1016\/j.cose.2019.101575_bib0029","doi-asserted-by":"crossref","first-page":"e0168675","DOI":"10.1371\/journal.pone.0168675","article-title":"Defending against advanced persistent threats using game-theory","volume":"12","author":"Rass","year":"2017","journal-title":"PLoS ONE"},{"key":"10.1016\/j.cose.2019.101575_bib0030","series-title":"Decision and GameTheory for Security","first-page":"494","article-title":"On the cost of game playing: how to control the expenses in mixed strategies","author":"Rass","year":"2017"},{"year":"2018","series-title":"Game theory for security and risk management: from theory to practice, Static & Dynamic Game Theory: Foundations & Applications","key":"10.1016\/j.cose.2019.101575_bib0031"},{"key":"10.1016\/j.cose.2019.101575_bib0032","series-title":"Decision and Game Theory for Security","first-page":"314","article-title":"Gadapt: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats","volume":"9996","author":"Rass","year":"2016"},{"year":"2001","series-title":"The Bayesian Choice","author":"Robert","key":"10.1016\/j.cose.2019.101575_bib0033"},{"issue":"4","key":"10.1016\/j.cose.2019.101575_bib0034","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.jclinepi.2007.04.021","article-title":"Radar plots: a useful way for presenting multivariate health care data","volume":"61","author":"Saary","year":"2008","journal-title":"J. Clin. Epidemiol."},{"key":"10.1016\/j.cose.2019.101575_bib0035","series-title":"Models of Strategic Rationality","first-page":"1","article-title":"Reexamination of the perfectness concept for equilibrium points in extensive games","volume":"vol. 2","author":"Selten","year":"1988"},{"year":"2006","series-title":"Stochastic Orders","author":"Shaked","key":"10.1016\/j.cose.2019.101575_bib0036"},{"key":"10.1016\/j.cose.2019.101575_bib0037","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.cose.2015.11.001","article-title":"Taxonomy of information security risk assessment (ISRA)","volume":"57","author":"Shameli-Sendi","year":"2016","journal-title":"Comput. Secur."},{"key":"10.1016\/j.cose.2019.101575_bib0038","series-title":"International Conference on Computational Intelligence and Security","first-page":"799","article-title":"Game theory based optimization of security configuration","author":"Shi","year":"2007"},{"key":"10.1016\/j.cose.2019.101575_bib0039","unstructured":"International Organization for Standardization, 2009. ISO 31000: Risk Management Principles and Guidelines. Geneva, Switherland."},{"issue":"2","key":"10.1016\/j.cose.2019.101575_bib0040","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1257\/jel.38.2.332","article-title":"Developments in non-expected utility theory: the hunt for a descriptive theory of choice under risk","volume":"38","author":"Starmer","year":"2000","journal-title":"J. Econ. Lit."},{"year":"2012","series-title":"Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned","author":"Tambe","key":"10.1016\/j.cose.2019.101575_bib0041"},{"year":"2017","series-title":"OMNeT++ 5.1: Discrete Event Simulator","author":"Varga","key":"10.1016\/j.cose.2019.101575_sbref0041"},{"key":"10.1016\/j.cose.2019.101575_bib0043","series-title":"Decision and Game Theory for Security","first-page":"314","article-title":"Disappointment-aversion in security games","author":"Wachter","year":"2018"},{"issue":"6","key":"10.1016\/j.cose.2019.101575_bib0044","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MIS.2012.108","article-title":"Does game theory work?","volume":"27","author":"Wooldridge","year":"2012","journal-title":"IEEE Intell. Syst."}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404819300458?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404819300458?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T07:08:58Z","timestamp":1656227338000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404819300458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":44,"alternative-id":["S0167404819300458"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2019.101575","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2019,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Quasi-purification of mixed game strategies: Sub-optimality of equilibria in security games","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2019.101575","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"101575"}}