{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:52:59Z","timestamp":1743000779533,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030169886"},{"type":"electronic","value":"9783030169893"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16989-3_2","type":"book-chapter","created":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T19:44:24Z","timestamp":1554839064000},"page":"9-28","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bandwidth Scanning when the Rivals Are Subjective"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Garnaev","sequence":"first","affiliation":[]},{"given":"Wade","family":"Trappe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,2]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Altman, E., Avrachenkov, K., Garnaev, A.: Generalized \n                    \n                      \n                    \n                    $$\\alpha $$\n                    \n                      \n                        \u03b1\n                      \n                    \n                  -fair resource allocation in wireless networks. In: 47th IEEE Conference on Decision and Control (CDC 2008), Cancun, Mexico, pp. 2414\u20132419 (2009)","DOI":"10.1109\/CDC.2008.4738709"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Anindya, I.C., Kantarcioglu, M.: Adversarial anomaly detection using centroid-based clustering. In: IEEE International Conference on Information Reuse and Integration (IRI), pp. 1\u20138 (2018)","DOI":"10.1109\/IRI.2018.00009"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1002\/(SICI)1520-6750(200003)47:2<85::AID-NAV1>3.0.CO;2-C","volume":"47","author":"VJ Baston","year":"2000","unstructured":"Baston, V.J., Garnaev, A.Y.: A search game with a protector. Naval Res. Logistics 47, 85\u201396 (2000)","journal-title":"Naval Res. Logistics"},{"key":"2_CR4","volume-title":"AWireless Networks Multiuser Detection in Cross-Layer Design","author":"C Comaniciu","year":"2005","unstructured":"Comaniciu, C., Mandayam, N.B., Poor, H.V.: AWireless Networks Multiuser Detection in Cross-Layer Design. Springer, New York (2005)"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1002\/nav.10009","volume":"49","author":"F Dambreville","year":"2002","unstructured":"Dambreville, F., Le Cadre, J.P.: Detection of a markovian target with optimization of the search efforts under generalized linear constraints. Naval Res. Logistics 49, 117\u2013142 (2002)","journal-title":"Naval Res. Logistics"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCOMM.2006.887483","volume":"55","author":"FF Digham","year":"2007","unstructured":"Digham, F.F., Alouini, M.S., Simon, M.K.: On the energy detection of unknown signals over fading channels. IEEE Trans. Commun. 55, 21\u201324 (2007)","journal-title":"IEEE Trans. Commun."},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1002\/1520-6750(199308)40:5<745::AID-NAV3220400514>3.0.CO;2-1","volume":"40","author":"A Garnaev","year":"1993","unstructured":"Garnaev, A.: A remark on a helicopter and submarine game. Naval Res. Logistics 40, 745\u2013753 (1993)","journal-title":"Naval Res. Logistics"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/BF01295850","volume":"26","author":"A Garnaev","year":"1997","unstructured":"Garnaev, A., Garnaeva, G., Goutal, P.: On the infiltration game. Int. J. Game Theory 26, 215\u2013221 (1997)","journal-title":"Int. J. Game Theory"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/TIFS.2015.2398360","volume":"10","author":"A Garnaev","year":"2015","unstructured":"Garnaev, A., Trappe, W.: One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious. IEEE Trans. Inf. Forensics Secur. 10, 1064\u20131075 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1109\/TIFS.2015.2510959","volume":"11","author":"A Garnaev","year":"2016","unstructured":"Garnaev, A., Trappe, W.: A bandwidth monitoring strategy under uncertainty of the adversary\u2019s activity. IEEE Trans. Inf. Forensics Secur. 11, 837\u2013849 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing scanning strategies: selecting scanning bandwidth in adversarial RF environments. In: 8th International Conference on Cognitive Radio Oriented Wireless Networks (Crowncom), pp. 148\u2013153 (2013)","DOI":"10.1109\/CROWNCom.2013.6636809"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Guan, S., Wang, J., Jiang, C., Tong, J., Ren, Y.: Intrusion detection for wireless sensor networks: a multi-criteria game approach. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 1\u20136 (2018)","DOI":"10.1109\/WCNC.2018.8377427"},{"key":"2_CR13","volume-title":"Game Theory in Wireless and Communication Networks: Theory, Models, and Applications","author":"Z Han","year":"2012","unstructured":"Han, Z., Niyato, D., Saad, W., Basar, T., Hjrungnes, A.: Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge University Press, New York (2012)"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1016\/j.ejor.2006.02.015","volume":"178","author":"R Hohzaki","year":"2007","unstructured":"Hohzaki, R.: An inspection game with multiple inspectees. Eur. J. Oper. Res. 178, 894\u2013906 (2007)","journal-title":"Eur. J. Oper. Res."},{"key":"2_CR15","first-page":"629","volume":"41","author":"R Hohzaki","year":"1998","unstructured":"Hohzaki, R., Iida, K.: A search game with reward criterion. J. Oper. Res. Soc. Japan 41, 629\u2013642 (1998)","journal-title":"J. Oper. Res. Soc. Japan"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.ejor.2007.08.032","volume":"191","author":"A Jotshi","year":"2008","unstructured":"Jotshi, A., Batta, R.: Search for an immobile entity on a network. Eur. J. Oper. Res. 191, 347\u2013359 (2008)","journal-title":"Eur. J. Oper. Res."},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2307\/1914185","volume":"47","author":"D Kahneman","year":"1979","unstructured":"Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 47, 263\u2013291 (1979)","journal-title":"Econometrica"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF00122574","volume":"5","author":"D Kahneman","year":"1992","unstructured":"Kahneman, D., Tversky, A.: Advances in prospect theory: cumulative representation of uncertainty. J. Risk Uncertainty 5, 297\u2013323 (1992)","journal-title":"J. Risk Uncertainty"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Liu, S., Chen, Y., Trappe, W., Greenstein, L.J.: ALDO: an anomaly detection framework for dynamic spectrum access networks. In: IEEE International Conference on Computer (INFOCOM), pp. 675\u2013683 (2009)","DOI":"10.1109\/INFCOM.2009.5061975"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Poongothai, T., Jayarajan, K.: A noncooperative game approach for intrusion detection in mobile adhoc networks. In: International Conference on Computing, Communication and Networking, pp. 1\u20134 (2008)","DOI":"10.1109\/ICCCNET.2008.4787668"},{"key":"2_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2341-0","volume-title":"An Introduction to Signal Detection and Estimation","author":"HV Poor","year":"1994","unstructured":"Poor, H.V.: An Introduction to Signal Detection and Estimation. Springer, New York (1994). \n                    https:\/\/doi.org\/10.1007\/978-1-4757-2341-0"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"497","DOI":"10.2307\/2998573","volume":"90","author":"D Prelec","year":"1998","unstructured":"Prelec, D.: The probability weighting function. Econometrica 90, 497\u2013528 (1998)","journal-title":"Econometrica"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Reddy, Y.B.: A game theory approach to detect malicious nodes in wireless sensor networks. In: Third International Conference on Sensor Technologies and Applications, pp. 462\u2013468 (2009)","DOI":"10.1109\/SENSORCOMM.2009.76"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"7697","DOI":"10.1109\/TVT.2017.2686853","volume":"66","author":"W Saad","year":"2017","unstructured":"Saad, W., Sanjab, A., Wang, Y., Kamhoua, C.A., Kwiat, K.A.: Hardware trojan detection game: a prospect-theoretic approach. IEEE Trans. Veh. Technol. 66, 7697\u20137710 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2_CR25","first-page":"207","volume":"16","author":"M Sakaguchi","year":"1973","unstructured":"Sakaguchi, M.: Two-sided search games. J. Oper. Res. Soc. Japan 16, 207\u2013225 (1973)","journal-title":"J. Oper. Res. Soc. Japan"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Sanjab, A., Saad, W., Basar, T.: Prospect theory for enhanced cyber-physical security of drone delivery systems: a network interdiction game. In: IEEE International Conference on Communications (ICC), Paris, France (2017)","DOI":"10.1109\/ICC.2017.7996862"},{"key":"2_CR27","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1109\/18.335891","volume":"40","author":"DW Sauder","year":"1994","unstructured":"Sauder, D.W., Geraniotis, E.: Signal detection games with power constraints. IEEE Trans. Inf. Theory 40, 795\u2013807 (1994)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2_CR28","unstructured":"Shen, S.: A game-theoretic approach for optimizing intrusion detection strategy in WSNs. In: 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC) (2011)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Vamvoudakis, K.G., Hespanha, J.P., Sinopoli, B., Mo, Y.: Adversarial detection as a zero-sum game. In: IEEE 51st IEEE Conference on Decision and Control (CDC), pp. 7133\u20137138 (2012)","DOI":"10.1109\/CDC.2012.6426383"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Wang, X., Feng, R., Wu, Y., Che, S., Ren, Y.: A game theoretic malicious nodes detection model in MANETs. In: IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS), pp. 1\u20136 (2012)","DOI":"10.1109\/MASS.2012.6708507"},{"key":"2_CR31","doi-asserted-by":"publisher","first-page":"2578","DOI":"10.1109\/TIFS.2015.2467593","volume":"10","author":"L Xiao","year":"2015","unstructured":"Xiao, L., Liu, J., Li, Q., Mandayam, N.B., Poor, H.V.: User-centric view of jamming games in cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 10, 2578\u20132590 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Xiao, L., Liu, J., Li, Y., Mandayam, N.B., Poor, H.V.: Prospect theoretic analysis of anti-jamming communications in cognitive radio networks. In: IEEE Global Communications Conference, pp. 746\u2013751 (2014)","DOI":"10.1109\/GLOCOM.2014.7036897"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Xu, D., Xiao, L., Mandayam, N.B., Poor, H.V.: Cumulative prospect theoretic study of a cloud storage defense game against advanced persistent threats. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 541\u2013546 (2017)","DOI":"10.1109\/INFCOMW.2017.8116435"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Game Theory for Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16989-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:20:31Z","timestamp":1558401631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16989-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030169886","9783030169893"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16989-3_2","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameNets","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Game Theory for Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamenets2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/gamenets.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"17","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}