{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:39:30Z","timestamp":1743061170038,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030199449"},{"type":"electronic","value":"9783030199456"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19945-6_22","type":"book-chapter","created":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T11:53:20Z","timestamp":1557489200000},"page":"307-320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Game Theory Model for Intrusion Prevention in Computer Networks"],"prefix":"10.1007","author":[{"given":"Juli\u00e1n Francisco","family":"Mojica S\u00e1nchez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Octavio Jos\u00e9","family":"Salcedo Parra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Miguel J.","family":"Espitia R.","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,5,10]]},"reference":[{"issue":"1","key":"22_CR1","doi-asserted-by":"publisher","first-page":"184208","DOI":"10.1109\/COMST.2015.2402161","volume":"18","author":"C Kolias","year":"2016","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutorials 18(1), 184208 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2402161","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"22_CR2","doi-asserted-by":"publisher","unstructured":"Huang, H., Hu, Y., Ja, Y., Ao, S.: A whole-process WiFi security perception software system. In: 2017 International Conference on Circuits, System and Simulation, ICCSS 2017, 151156 (2017). https:\/\/doi.org\/10.1109\/CIRSYSSIM.2017.8023201","DOI":"10.1109\/CIRSYSSIM.2017.8023201"},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Michaels, S., Akkaya, K., Selcuk Uluagac, A.: Inducing data loss in Zigbee networks via join\/association handshake spoofing. In: 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, pp. 401\u2013\u2013405 (2016). https:\/\/doi.org\/10.1109\/cns.2016.7860527","DOI":"10.1109\/cns.2016.7860527"},{"key":"22_CR4","doi-asserted-by":"publisher","unstructured":"Sforzin, A., Marmol, F.G., Conti, M., Bohli, J.M.: RPiDS: raspberry Pi IDS - a fruitful intrusion detection system for IoT. In: Proceedings - 13th IEEE International Conference on Ubiquitous Intelligence and Computing, 13th IEEE International Conference on Advanced and Trusted Computing, 16th IEEE International Conference on Scalable Computing and Communications, IEEE Internationa, pp. 440\u2013448 (2017). https:\/\/doi.org\/10.1109\/UIC-ATC-ScalCom-CBDCom-IoPSmartWorld.2016.0080","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoPSmartWorld.2016.0080"},{"issue":"1","key":"22_CR5","doi-asserted-by":"publisher","first-page":"597609","DOI":"10.1007\/s10586-016-0716-0","volume":"20","author":"PK Sharma","year":"2017","unstructured":"Sharma, P.K., Moon, S.Y., Moon, D., Park, J.H.: DFA-AD: a distributed framework architecture for the detection of advanced persistent threats. Cluster Comput. 20(1), 597609 (2017). https:\/\/doi.org\/10.1007\/s10586-016-0716-0","journal-title":"Cluster Comput."},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Chen, J., Chen, C.: Design of complex event-processing IDS in internet of things. In: Proceedings - 2014 6th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2014, pp. 226\u2013229 (2014). https:\/\/doi.org\/10.1109\/ICMTMA.2014.57","DOI":"10.1109\/ICMTMA.2014.57"},{"issue":"1","key":"22_CR7","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/2886100","volume":"16","author":"K Wang","year":"2016","unstructured":"Wang, K., Du, M., Yang, D., Zhu, C., Shen, J., Zhang, Y.: GameTheory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Trans. Embed. Comput. Syst. 16(1), 121 (2016). https:\/\/doi.org\/10.1145\/2886100","journal-title":"ACM Trans. Embed. Comput. Syst."},{"issue":"3","key":"22_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"Mohammad Hossein Manshaei","year":"2013","unstructured":"Manshaei, M.M.H., Zhu, Q., Alpcan, T., Bacar, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. 45 (2013). https:\/\/doi.org\/10.1145\/2480741.2480742","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"22_CR9","doi-asserted-by":"crossref","first-page":"2123","DOI":"10.17485\/ijst\/2012\/v5i2.9","volume":"5","author":"MK Rafsanjani","year":"2012","unstructured":"Rafsanjani, M.K., Aliahmadipour, L., Javidi, M.M.: A hybrid intrusion detection by game theory approaches in MANET. Indian J. Sci. Technol. 5(2), 2123\u20132131 (2012)","journal-title":"Indian J. Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19945-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:31:34Z","timestamp":1709818294000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-19945-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030199449","9783030199456"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19945-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln\/Home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}