{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T17:01:43Z","timestamp":1762016503862,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030307189"},{"type":"electronic","value":"9783030307196"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30719-6_6","type":"book-chapter","created":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T06:27:36Z","timestamp":1567232856000},"page":"112-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Empirical Game-Theoretic Methods for Adaptive Cyber-Defense"],"prefix":"10.1007","author":[{"given":"Michael P.","family":"Wellman","sequence":"first","affiliation":[]},{"given":"Thanh H.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Mason","family":"Wright","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,31]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Albanese, M., Connell, W., Venkatesan, S., Cybenko, G.: Moving target defense quantification. In: Jajodia et al. (2019)","DOI":"10.1007\/978-3-030-30719-6_5"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-34266-0_15","volume-title":"Decision and Game Theory for Security","author":"KD Bowers","year":"2012","unstructured":"Bowers, K.D., van Dijk, M., Griffin, R., Juels, A., Oprea, A., Rivest, R.L., Triandopoulos, N.: Defending against the unknown enemy: applying FlipIt to system security. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 248\u2013263. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34266-0_15"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1","volume-title":"Decision and Game Theory for Security","year":"2018","unstructured":"Bushnell, L., Poovendran, R., Ba\u015far, T. (eds.): GameSec 2018. LNCS, vol. 11199. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01554-1"},{"key":"6_CR4","unstructured":"\u010cagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.-P.: On selfish behavior in CSMA\/CA networks. In: 24th IEEE International Conference on Computer Communications, pp. 2513\u20132524 (2005)"},{"key":"6_CR5","unstructured":"Chapman, M.: Cyber Hide-and-Seek. Ph.D. thesis, King\u2019s College London (2016)"},{"key":"6_CR6","first-page":"151","volume":"34","author":"Q Duong","year":"2010","unstructured":"Duong, Q., LeFevre, K., Wellman, M.P.: Strategic modeling of information sharing among data privacy attackers. Informatica 34, 151\u2013158 (2010)","journal-title":"Informatica"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"2825","DOI":"10.1073\/pnas.1700442114","volume":"114","author":"B Edwards","year":"2017","unstructured":"Edwards, B., Furnas, A., Forrest, S., Axelrod, R.: Strategic aspects of cyberattack, attribution, and blame. Proc. Natl. Acad. Sci. 114, 2825\u20132830 (2017)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Evans, D., Nguyen-Tuong, A., Knight, J.: Effectiveness of moving target defenses. In: Jajodia et al. (2011)","DOI":"10.1007\/978-1-4614-0977-9_2"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-47413-7_12","volume-title":"Decision and Game Theory for Security","author":"S Farhang","year":"2016","unstructured":"Farhang, S., Grossklags, J.: FlipLeakage: a game-theoretic approach to protect against stealthy attackers in the presence of information leakage. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 195\u2013214. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47413-7_12"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Fearnley, J., Gairing, M., Goldberg, P., Savani, R.: Learning equilibria of games via payoff queries. In: 14th ACM Conference on Electronic Commerce (2013)","DOI":"10.1145\/2492002.2482558"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-21599-5_21","volume-title":"Trust and Trustworthy Computing","author":"G Frazier","year":"2011","unstructured":"Frazier, G., Duong, Q., Wellman, M.P., Petersen, E.: Incentivizing responsible networking via introduction-based routing. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 277\u2013293. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21599-5_21"},{"key":"6_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9","volume-title":"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats","year":"2011","unstructured":"Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Sean Wang, X. (eds.): Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Springer, New York (2011). https:\/\/doi.org\/10.1007\/978-1-4614-0977-9"},{"key":"6_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30719-6","volume-title":"Adversarial and Uncertain Reasoning for Adaptive Cyber Defense","year":"2019","unstructured":"Jajodia, S., Cybenko, G., Liu, P., Wang, C., Wellman, M.P. (eds.): Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer, Champ (2019). https:\/\/doi.org\/10.1007\/978-3-030-30719-6"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Jia, Q., Sun, K., Stavrou, A.: MOTAG: moving target defense against internet denial of service attacks. In: 22nd International Conference on Computer Communications and Networks (2013)","DOI":"10.1109\/ICCCN.2013.6614155"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Jones, S., et al.: Evaluating moving target defense with PLADD. Technical report 8432R, Sandia National Lab (2015)","DOI":"10.2172\/1222986"},{"key":"6_CR16","unstructured":"Jordan, P.R., Schvartzman, L.J., Wellman, M.P.: Strategy exploration in empirical games. In: 9th International Conference on Autonomous Agents and Multi-Agent Systems, pp. 1131\u20131138 (2010)"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2014.07.001","volume":"13","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Schweitzer, P.: DAG-based attack and defense modeling: don\u2019t miss the forest for the attack trees. Comput. Sci. Rev. 13, 1\u201338 (2014)","journal-title":"Comput. Sci. Rev."},{"key":"6_CR18","unstructured":"Lanctot, M., et al.: A unified game-theoretic approach to multiagent reinforcement learning. In: 31st Annual Conference on Neural Information Processing Systems (2017)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-45046-4_26","volume-title":"Web and Internet Economics","author":"A Laszka","year":"2013","unstructured":"Laszka, A., Johnson, B., Grossklags, J.: Mitigating covert compromises. In: Chen, Y., Immorlica, N. (eds.) WINE 2013. LNCS, vol. 8289, pp. 319\u2013332. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-45046-4_26"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-12601-2_10","volume-title":"Decision and Game Theory for Security","author":"A Laszka","year":"2014","unstructured":"Laszka, A., Horvath, G., Felegyhazi, M., Butty\u00e1n, L.: FlipThem: modeling targeted attacks with FlipIt for multiple resources. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 175\u2013194. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12601-2_10"},{"issue":"25","key":"6_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Ba\u015far, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(25), 1\u201339 (2013)","journal-title":"ACM Comput. Surv."},{"key":"6_CR22","unstructured":"McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: software tools for game theory, Version 13.1.2 (2014). www.gambit-project.org"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Miehling, E., Rasouli, M., Teneketzis, D.: Optimal defense policies for partially observable spreading processes on Bayesian attack graphs. In: Second ACM Workshop on Moving Target Defense, pp. 67\u201376 (2015)","DOI":"10.1145\/2808475.2808482"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"2790","DOI":"10.1109\/TIFS.2016.2599005","volume":"11","author":"P Naghizadeh","year":"2016","unstructured":"Naghizadeh, P., Liu, M.: Opting out of incentive mechanisms: a study of security as a non-excludable public good. IEEE Trans. Inf. Forensics Secur. 11, 2790\u20132803 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Wright, M., Wellman, M.P., Singh, S.: Multi-stage attack graph security games: heuristic strategies, with empirical game-theoretic analysis. In: Fourth ACM Workshop on Moving Target Defense, pp. 87\u201397 (2017)","DOI":"10.1145\/3140549.3140562"},{"key":"6_CR26","volume-title":"Analyzing Computer Security: A Threat\/Vulnerability\/Countermeasure Approach","author":"CP Pfleeger","year":"2012","unstructured":"Pfleeger, C.P., Pfleeger, S.L.: Analyzing Computer Security: A Threat\/Vulnerability\/Countermeasure Approach. Prentice Hall, Upper Saddle River (2012)"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-642-34266-0_14","volume-title":"Decision and Game Theory for Security","author":"V Pham","year":"2012","unstructured":"Pham, V., Cid, C.: Are we compromised? Modelling security assessment games. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 234\u2013247. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34266-0_14"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Workshop on New Security Paradigms, pp. 71\u201379 (1998)","DOI":"10.1145\/310889.310919"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Prakash, A., Wellman, M.P.: Empirical game-theoretic analysis for moving target defense. In: Second ACM Workshop on Moving Target Defense, pp. 57\u201365 (2015)","DOI":"10.1145\/2808475.2808483"},{"key":"6_CR30","first-page":"2018","volume":"4123736","author":"C Qi","year":"2018","unstructured":"Qi, C., Jiangxing, W., Cheng, G., Ai, J., Zhao, S.: Security analysis of dynamic SDN architectures based on game theory. Secur. Commun. Netw. 4123736, 2018 (2018)","journal-title":"Secur. Commun. Netw."},{"key":"6_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7","volume-title":"Decision and Game Theory for Security","year":"2017","unstructured":"Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S. (eds.): Decision and Game Theory for Security. LNCS, vol. 10575. Springer, Cham (2017a). https:\/\/doi.org\/10.1007\/978-3-319-68711-7"},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"e0168675","DOI":"10.1371\/journal.pone.0168675","volume":"12","author":"S Rass","year":"2017","unstructured":"Rass, S., K\u00f6nig, S., Schauer, S.: Defending against advanced persistent threats using game-theory. PLoS ONE 12, e0168675 (2017b)","journal-title":"PLoS ONE"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Roy, S., Ellis, C., Shiva, S.G., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 43rd Hawaii International Conference on System Sciences (2010)","DOI":"10.1109\/HICSS.2010.35"},{"key":"6_CR34","unstructured":"Schvartzman, L.J., Wellman, M.P.: Stronger CDA strategies through empirical game-theoretic analysis and reinforcement learning. In: 8th International Conference on Autonomous Agents and Multi-Agent Systems, pp. 249\u2013256, Budapest (2009)"},{"key":"6_CR35","unstructured":"Silver, D.: Mastering chess and shogi by self-play with a general reinforcement learning algorithm. Technical report, arXiv 1712.01815 (2017)"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: 27th International Joint Conference on Artificial Intelligence, pp. 5494\u20135501 (2018)","DOI":"10.24963\/ijcai.2018\/775"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Sokota, S., Ho, C., Wiedenbeck, B.: Learning deviation payoffs in simulation-based games. In: 33rd AAAI Conference on Artificial Intelligence, pp. 1266\u20131273 (2019)","DOI":"10.1609\/aaai.v33i01.33012173"},{"key":"6_CR38","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031","volume-title":"Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned","author":"M Tambe","year":"2011","unstructured":"Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011)"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Tavafoghi, H., Yi, O., Teneketzis, D., Wellman, M.P.: Game theoretic approaches to cyber security: issues, results and challenges. In: Jajodia et al. (2019)","DOI":"10.1007\/978-3-030-30719-6_3"},{"key":"6_CR40","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s00145-012-9134-5","volume":"26","author":"M Dijk van","year":"2013","unstructured":"van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: the game of \u201cstealthy takeover\u201d. J. Cryptol. 26, 655\u2013713 (2013)","journal-title":"J. Cryptol."},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Venkatesan, S., Albanese, M., Amin, K., Jajodia, S., Wright, M.: A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. In: IEEE Conference on Communications and Network Security (2016)","DOI":"10.1109\/CNS.2016.7860486"},{"issue":"3","key":"6_CR42","doi-asserted-by":"publisher","first-page":"16:1","DOI":"10.1145\/1842713.1842719","volume":"20","author":"Y Vorobeychik","year":"2010","unstructured":"Vorobeychik, Y.: Probabilistic analysis of simulation-based games. ACM Trans. Model. Comput. Simul. 20(3), 16:1\u201316:25 (2010)","journal-title":"ACM Trans. Model. Comput. Simul."},{"key":"6_CR43","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10994-007-0715-8","volume":"67","author":"Y Vorobeychik","year":"2007","unstructured":"Vorobeychik, Y., Wellman, M.P., Singh, S.: Learning payoff functions in infinite games. Mach. Learn. 67, 145\u2013168 (2007)","journal-title":"Mach. Learn."},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Wang, Y.: Deep reinforcement learning for green security games with real-time information. In: 33rd AAAI Conference on Artificial Intelligence (2019)","DOI":"10.1609\/aaai.v33i01.33011401"},{"key":"6_CR45","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1007\/s10458-016-9336-6","volume":"30","author":"MP Wellman","year":"2016","unstructured":"Wellman, M.P.: Putting the agent in agent-based modeling. Auton. Agents Multi-Agent Syst. 30, 1175\u20131189 (2016)","journal-title":"Auton. Agents Multi-Agent Syst."},{"key":"6_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-12601-2_3","volume-title":"Decision and Game Theory for Security","author":"MP Wellman","year":"2014","unstructured":"Wellman, M.P., Prakash, A.: Empirical game-theoretic analysis of an adaptive cyber-defense scenario (preliminary\u00a0report). In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 43\u201358. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12601-2_3"},{"key":"6_CR47","unstructured":"Wellman, M.P., Reeves, D.M., Lochner, K.M., Cheng, S.-F., Suri, R.: Approximate strategic reasoning through hierarchical reduction of large symmetric games. In: 20th National Conference on Artificial Intelligence, pp. 502\u2013508 (2005)"},{"key":"6_CR48","unstructured":"Wellman, M.P., Kim, T.H., Duong, Q.: Analyzing incentives for protocol compliance in complex domains: a case study of introduction-based routing. In: Twelfth Workshop on the Economics of Information Security (2013)"},{"key":"6_CR49","unstructured":"Wiedenbeck, B., Cassell, B.-A., Wellman, M.P.: Bootstrap techniques for empirical games. In: 13th International Conference on Autonomous Agents and Multi-Agent Systems, pp. 597\u2013604 (2014)"},{"key":"6_CR50","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, B., Yang, F., Wellman, M.P.: A regression approach for modeling games with many symmetric players. In: 32nd AAAI Conference on Artificial Intelligence, pp. 1266\u20131273 (2018)","DOI":"10.1609\/aaai.v32i1.11483"},{"key":"6_CR51","unstructured":"Wright, M., Wellman, M.P.: Evaluating the stability of non-adaptive trading in continuous double auctions. In: 17th International Conference on Autonomous Agents and Multi-Agent Systems, pp. 614\u2013622 (2018)"},{"key":"6_CR52","doi-asserted-by":"crossref","unstructured":"Wright, M., Venkatesan, S., Albanese, M., Wellman, M.P.: Moving target defense against DDoS attacks: an empirical game-theoretic analysis. In: Third ACM Workshop on Moving Target Defense (2016)","DOI":"10.1145\/2995272.2995279"},{"key":"6_CR53","doi-asserted-by":"crossref","unstructured":"Wright, M., Wang, Y., Wellman, M.P.: Iterated deep reinforcement learning in games: history-aware training for improved stability. In: 20th ACM Conference on Economics and Computation (2019)","DOI":"10.1145\/3328526.3329634"}],"container-title":["Lecture Notes in Computer Science","Adversarial and Uncertain Reasoning for Adaptive Cyber Defense"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30719-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T01:36:49Z","timestamp":1664242609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30719-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030307189","9783030307196"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30719-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"31 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}