{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T07:48:33Z","timestamp":1770018513071,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030306182","type":"print"},{"value":"9783030306199","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30619-9_21","type":"book-chapter","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T06:51:47Z","timestamp":1568184707000},"page":"290-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Game Theory Based Dynamic Defense Mechanism for SDN"],"prefix":"10.1007","author":[{"given":"Deming","family":"Mao","sequence":"first","affiliation":[]},{"given":"Shuwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"issue":"6","key":"21_CR1","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/JIOT.2016.2547994","volume":"3","author":"QD La","year":"2016","unstructured":"La, Q.D., Quek, T.Q.S., Lee, J., et al.: Deceptive attack and defense game in honeypot-enabled networks for the internet of things. IEEE Internet of Things J. 3(6), 1025\u20131035 (2016)","journal-title":"IEEE Internet of Things J."},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.ijepes.2018.07.007","volume":"104","author":"Q Wang","year":"2019","unstructured":"Wang, Q., Tai, W., Tang, Y., et al.: A two-layer game theoretical attack-defense model for a false data injection attack against power systems. Int. J. Electr. Power Energy Syst. 104, 169\u2013177 (2019)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 55\u201360. ACM (2013)","DOI":"10.1145\/2491185.2491199"},{"issue":"4","key":"21_CR4","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","volume":"17","author":"I Ahmad","year":"2015","unstructured":"Ahmad, I., Namal, S., Ylianttila, M., et al.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317\u20132346 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Fugate, S., Ferguson-Walter, K., Mauger, J., et al.: Game Theory for Adaptive Defensive Cyber Deception. Space and Naval Warfare Systems Center Pacific, San Diego, United States (2018)","DOI":"10.1145\/3314058.3314063"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/570639","volume":"2","author":"NS Kovach","year":"2015","unstructured":"Kovach, N.S., Gibson, A.S., Lamont, G.B.: Hypergame theory: a model for conflict, misperception, and deception. Game Theory 2, 1\u201320 (2015)","journal-title":"Game Theory"},{"key":"21_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9","volume-title":"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats","author":"S Jajodia","year":"2011","unstructured":"Jajodia, S., Ghosh, A.K., Swarup, V., et al.: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Springer, New York (2011). \nhttps:\/\/doi.org\/10.1007\/978-1-4614-0977-9"},{"issue":"6","key":"21_CR8","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MCOM.2015.7120048","volume":"53","author":"M Dabbagh","year":"2015","unstructured":"Dabbagh, M., Hamdaoui, B., Guizani, M., et al.: Software-defined networking security: pros and cons. IEEE Commun. Mag. 53(6), 73\u201379 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2015.7081073","volume":"53","author":"A Akhunzada","year":"2015","unstructured":"Akhunzada, A., Ahmed, E., Gani, A., et al.: Securing software defined networks: taxonomy, requirements, and open issues. Commun. Mag. 53(4), 36\u201344 (2015)","journal-title":"Commun. Mag."},{"issue":"01","key":"21_CR10","first-page":"43","volume":"1","author":"JM Zhu","year":"2015","unstructured":"Zhu, J.M., Wang, Q.: Analysis of cyberspace security based on game theory. Chin. J. Netw. Inf. Secur. 1(01), 43\u201349 (2015)","journal-title":"Chin. J. Netw. Inf. Secur."},{"issue":"3","key":"21_CR11","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., et al.: Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 45(3), 25 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Kayode, A.B., Babatunde, I.G., Israel, H.D.: DGM approach to network attacker and defender strategies. In: 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 313\u2013320. IEEE (2013)","DOI":"10.1109\/ICITST.2013.6750213"},{"issue":"01","key":"21_CR13","first-page":"195","volume":"43","author":"HW Zhang","year":"2016","unstructured":"Zhang, H.W., Zhang, J., Han, J.H.: Defense strategies selection method based on non-cooperative game attack forecast. Comput. Sci. 43(01), 195\u2013201 (2016)","journal-title":"Comput. Sci."},{"issue":"12","key":"21_CR14","first-page":"714","volume":"47","author":"W Jiang","year":"2014","unstructured":"Jiang, W., Fang, B.X.: Defense strategies selection based on attack- defense game model. J. Comput. Res. Dev. 47(12), 714\u2013723 (2014)","journal-title":"J. Comput. Res. Dev."},{"issue":"8","key":"21_CR15","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MC.2008.295","volume":"41","author":"L Carin","year":"2008","unstructured":"Carin, L., Cybenko, G., Hughes, J.: Cybersecurity strategies: The queries methodology. Computer 41(8), 20\u201326 (2008)","journal-title":"Computer"},{"issue":"09","key":"21_CR16","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.3724\/SP.J.1016.2010.01748","volume":"33","author":"YZ Wang","year":"2010","unstructured":"Wang, Y.Z., Lin, C., Cheng, X.Q., et al.: Analysis for network attack-defense based on stochastic game model. Chin. J. Comput. 33(09), 1748\u20131762 (2010)","journal-title":"Chin. J. Comput."},{"key":"21_CR17","unstructured":"Gueye, A., Walrand, J.C.: Security in networks: a game-theoretic approach. In: Proceedings of the 47th IEEE Conference on Decision and Control Cancun, pp. 829\u2013834 (2013). Springer, Mexico"},{"issue":"01","key":"21_CR18","first-page":"82","volume":"46","author":"J Liu","year":"2018","unstructured":"Liu, J., Zhang, H.Q., Liu, Y.: Research on optimal selection of moving target defense policy based on dynamic game with incomplete information. Acta Electronica Sinica 46(01), 82\u201389 (2018)","journal-title":"Acta Electronica Sinica"},{"issue":"02","key":"21_CR19","first-page":"431","volume":"45","author":"HW Zhang","year":"2017","unstructured":"Zhang, H.W., Li, T.: Optimal active defense based on multistage attack-defense signaling game. Acta Electronica Sinica 45(02), 431\u2013439 (2017)","journal-title":"Acta Electronica Sinica"},{"issue":"02","key":"21_CR20","first-page":"306","volume":"48","author":"WQ Lin","year":"2011","unstructured":"Lin, W.Q., Wang, H., Liu, J.H., et al.: Research on active defense technology in network security based on non-cooperative dynamic game theory. J. Comput. Res. Dev. 48(02), 306\u2013316 (2011)","journal-title":"J. Comput. Res. Dev."},{"issue":"1","key":"21_CR21","first-page":"54","volume":"35","author":"J Zhu","year":"2014","unstructured":"Zhu, J., Song, B., Hang, Q.: Evolution game model of offense-defense for network security based on system dynamics. J. Commun. 35(1), 54\u201361 (2014)","journal-title":"J. Commun."},{"key":"21_CR22","unstructured":"Pingree, L.: Emerging technology analysis: deception techniques and technologies create security technology business opportunities. Gartner Inc. (2015)"},{"key":"21_CR23","volume-title":"Game Theory: An Introduction","author":"S Tadelis","year":"2014","unstructured":"Tadelis, S.: Game Theory: An Introduction. Princeton University Press, Princeton (2014)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30619-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:08:31Z","timestamp":1584403711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30619-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030306182","9783030306199"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30619-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ml4cs2019.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}