{"id":"https://openalex.org/W1990130467","doi":"https://doi.org/10.4236/jis.2010.11005","title":"Game Theory Based Network Security","display_name":"Game Theory Based Network Security","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1990130467","doi":"https://doi.org/10.4236/jis.2010.11005","mag":"1990130467"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.4236/jis.2010.11005","pdf_url":"http://www.scirp.org/journal/PaperDownload.aspx?paperID=2330","source":{"id":"https://openalex.org/S4210193871","display_name":"Journal of Information Security","issn_l":"2153-1234","issn":["2153-1234","2153-1242"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320480","host_organization_name":"Scientific Research Publishing","host_organization_lineage":["https://openalex.org/P4310320480"],"host_organization_lineage_names":["Scientific Research Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://www.scirp.org/journal/PaperDownload.aspx?paperID=2330","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033086323","display_name":"Yi Luo","orcid":"https://orcid.org/0000-0001-6123-9363"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yi Luo","raw_affiliation_strings":["Department of Systems and Industrial Engineering, University of Arizona, Tucson, USA"],"affiliations":[{"raw_affiliation_string":"Department of Systems and Industrial Engineering, University of Arizona, Tucson, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017789014","display_name":"Ferenc Szidarovszky","orcid":"https://orcid.org/0000-0002-7627-779X"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ferenc Szidarovszky","raw_affiliation_strings":["Department of Systems and Industrial Engineering, University of Arizona, Tucson, USA"],"affiliations":[{"raw_affiliation_string":"Department of Systems and Industrial Engineering, University of Arizona, Tucson, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029751893","display_name":"Youssif Al\u2010Nashif","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Youssif Al-Nashif","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, Tucson, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, Tucson, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057335897","display_name":"Salim Hariri","orcid":"https://orcid.org/0000-0003-3956-3401"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Salim Hariri","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Arizona, Tucson, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Arizona, Tucson, USA","institution_ids":["https://openalex.org/I138006243"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.999,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.969384,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"01","issue":"01","first_page":"41","last_page":"44"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9122,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9122,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5745139},{"id":"https://openalex.org/keywords/game-tree","display_name":"Game tree","score":0.48723784},{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.45934778}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.91262865},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6315639},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5745139},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4895576},{"id":"https://openalex.org/C95815963","wikidata":"https://www.wikidata.org/wiki/Q1377033","display_name":"Game tree","level":4,"score":0.48723784},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4850144},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.45934778},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4585585},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.44532245},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.43082726},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39385825},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32516342},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.4236/jis.2010.11005","pdf_url":"http://www.scirp.org/journal/PaperDownload.aspx?paperID=2330","source":{"id":"https://openalex.org/S4210193871","display_name":"Journal of Information Security","issn_l":"2153-1234","issn":["2153-1234","2153-1242"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320480","host_organization_name":"Scientific Research Publishing","host_organization_lineage":["https://openalex.org/P4310320480"],"host_organization_lineage_names":["Scientific Research Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.4236/jis.2010.11005","pdf_url":"http://www.scirp.org/journal/PaperDownload.aspx?paperID=2330","source":{"id":"https://openalex.org/S4210193871","display_name":"Journal of Information Security","issn_l":"2153-1234","issn":["2153-1234","2153-1242"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320480","host_organization_name":"Scientific Research Publishing","host_organization_lineage":["https://openalex.org/P4310320480"],"host_organization_lineage_names":["Scientific Research Publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.65,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W1506084478","https://openalex.org/W1968909445","https://openalex.org/W1970496399","https://openalex.org/W1974111917","https://openalex.org/W2004168725","https://openalex.org/W2067601737","https://openalex.org/W2111485333","https://openalex.org/W2797051019"],"related_works":["https://openalex.org/W4242434027","https://openalex.org/W4200458633","https://openalex.org/W312043615","https://openalex.org/W2738041616","https://openalex.org/W2566384264","https://openalex.org/W2530083366","https://openalex.org/W2098501469","https://openalex.org/W1968909445","https://openalex.org/W1923171733","https://openalex.org/W1854148037"],"abstract_inverted_index":{"The":[0,29,68],"interactions":[1],"between":[2],"attackers":[3],"and":[4,22,47,76,84,90,147],"network":[5,146],"administrator":[6,49,69],"are":[7,112],"modeled":[8],"as":[9],"a":[10,32,37,125,138],"non-cooperative":[11],"non-zero-sum":[12],"dynamic":[13],"game":[14,39,107,121],"with":[15],"incomplete":[16],"information,":[17],"which":[18],"considers":[19],"the":[20,23,42,45,48,51,60,73,81,95,98,105,117,120,142,145],"uncertainty":[21],"special":[24,38],"properties":[25],"of":[26,97,103,119,144],"multi-stage":[27],"attacks.":[28],"model":[30],"is":[31,44,50,56,149],"Fictitious":[33],"Play":[34],"approach":[35],"along":[36],"tree":[40],"when":[41],"attacker":[43],"leader":[46],"follower.":[52],"Multi-objective":[53],"optimization":[54],"methodology":[55],"used":[57],"to":[58,93,115,124],"predict":[59],"attacker's":[61,74,82,99],"best":[62],"actions":[63,75],"at":[64],"each":[65,87],"decision":[66],"node.":[67],"also":[70,150],"keeps":[71],"tracking":[72],"updates":[77],"his":[78],"knowledge":[79],"on":[80],"behavior":[83],"objectives":[85],"after":[86],"detected":[88],"attack,":[89],"uses":[91],"it":[92,148],"update":[94],"prediction":[96],"future":[100],"actions.":[101],"Instead":[102],"searching":[104],"entire":[106],"tree,":[108,122],"appropriate":[109],"time":[110],"horizons":[111],"dynamically":[113],"determined":[114],"reduce":[116],"size":[118],"leading":[123],"new,":[126],"fast,":[127],"adaptive":[128],"learning":[129],"algorithm.":[130],"Numerical":[131],"experiments":[132],"show":[133],"that":[134],"our":[135],"algorithm":[136],"has":[137],"significant":[139],"reduction":[140],"in":[141],"damage":[143],"more":[151],"efficient":[152],"than":[153],"other":[154],"existing":[155],"algorithms.":[156]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1990130467","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":6}],"updated_date":"2025-01-07T14:24:44.935006","created_date":"2016-06-24"}