{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:49:38Z","timestamp":1769928578138,"version":"3.49.0"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030647926","type":"print"},{"value":"9783030647933","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64793-3_8","type":"book-chapter","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T20:06:15Z","timestamp":1608581175000},"page":"147-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Harnessing the Power of Deception in Attack Graph-Based Security Games"],"prefix":"10.1007","author":[{"given":"Stephanie","family":"Milani","sequence":"first","affiliation":[]},{"given":"Weiran","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Kevin S.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Sridhar","family":"Venkatesan","sequence":"additional","affiliation":[]},{"given":"Nandi O.","family":"Leslie","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abdallah, M., Naghizadeh, P., Hota, A.R., Cason, T., Bagchi, S., Sundaram, S.: Behavioral and game-theoretic security investments in interdependent systems modeled by attack graphs. IEEE Trans. Control Netw. Syst. (2020)","DOI":"10.1109\/TCNS.2020.2988007"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Achleitner, S., La Porta, T., McDaniel, P., Sugrim, S., Krishnamurthy, S.V., Chadha, R.: Cyber deception: virtual networks to defend insider reconnaissance. In: International Workshop Managing Insider security Threats (2016)","DOI":"10.1145\/2995959.2995962"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Albanese, M., Battista, E., Jajodia, S.: A deception based approach for defeating OS and service fingerprinting. In: Conference on Communications and Network Security (CNS) (2015)","DOI":"10.1109\/CNS.2015.7346842"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Albanese, M., Battista, E., Jajodia, S.: Deceiving attackers by creating a virtual attack surface. In: Cyber Deception (2016)","DOI":"10.1007\/978-3-319-32699-3_8"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Almeshekah, M., Spafford, E.: Planning and integrating deception into computer security defenses. In: New Security Paradigms Workshop (2014)","DOI":"10.1145\/2683467.2683482"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Almeshekah, M., Spafford, E.: Cyber security deception. In: Cyber Deception (2016)","DOI":"10.1007\/978-3-319-32699-3_2"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Conference on Computer and Communications Security (2002)","DOI":"10.1145\/586110.586140"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"An, B., Ord\u00f3\u00f1ez, F., Tambe, M., Shieh, E., Yang, R., Baldwin, C., et al.: A deployed quantal response-based patrol planning system for the US coast guard. Interfaces 43(5) (2013)","DOI":"10.1287\/inte.2013.0700"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Anwar, A.H., Kamhoua, C., Leslie, N.: A game-theoretic framework for dynamic cyber deception in internet of battlefield things. In: International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (2019)","DOI":"10.1145\/3360774.3368204"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Anwar, A.H., Kamhoua, C., Leslie, N.: Honeypot allocation over attack graphs in cyber deception games. In: International Conference on Computing, Networking and Communications (2020)","DOI":"10.1109\/ICNC47757.2020.9049764"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-030-32430-8_2","volume-title":"Decision and Game Theory for Security","author":"A Basak","year":"2019","unstructured":"Basak, A., Kamhoua, C., Venkatesan, S., Gutierrez, M., Anwar, A.H., Kiekintveld, C.: Identifying stealthy attackers in a game theoretic framework using deception. In: Alpcan, T., Vorobeychik, Y., Baras, J.S., D\u00e1n, G. (eds.) GameSec 2019. LNCS, vol. 11836, pp. 21\u201332. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32430-8_2"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Bercovitch, M., Renford, M., Hasson, L., Shabtai, A., Rokach, L., Elovici, Y.: HoneyGen: an automated honeytokens generator. In: IEEE ISI (2011)","DOI":"10.1109\/ISI.2011.5984063"},{"key":"8_CR13","unstructured":"Blocki, J., Christin, N., Datta, A., Procaccia, A.D., Sinha, A.: Audit games. In: International Joint Conference on Artificial Intelligence (2013)"},{"key":"8_CR14","unstructured":"Bondi, E., Oh, H., Xu, H., Fang, F., Dilkina, B., Tambe, M.: Broken signals in security games: coordinating patrollers and sensors in the real world. In: International Conference on Autonomous Agents and MultiAgent Systems (2019)"},{"key":"8_CR15","unstructured":"Car and Driver: artist shows google maps\u2019 control over our lives by creating a fake traffic jam (2020)"},{"key":"8_CR16","unstructured":"Cohen, F.: The use of deception techniques: honeypots and decoys. In: Handbook Information Security, vol. 3(1) (2006)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Conitzer, V., Sandholm, T.: Computing the optimal strategy to commit to. In: conference on Electronic commerce (2006)","DOI":"10.1145\/1134707.1134717"},{"key":"8_CR18","unstructured":"Dong, C., Zhao, L.: Sensor network security defense strategy based on attack graph and improved binary PSO. Saf. Sci. 117, 81\u201387 (2019)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-319-25594-1_13","volume-title":"Decision and Game Theory for Security","author":"K Durkota","year":"2015","unstructured":"Durkota, K., Lis\u00fd, V., Bo\u0161ansk\u00fd, B., Kiekintveld, C.: Approximate solutions for attack graph games with imperfect information. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 228\u2013249. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25594-1_13"},{"key":"8_CR20","unstructured":"Durkota, K., Lis\u1ef3, V., Bo\u0161ansk\u1ef3, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: International Joint Conference on Artificial Intelligence (2015)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Durkota, K., Lis\u1ef3, V., Bo\u0161ansk\u1ef3, B., Kiekintveld, C., P\u011bchou\u010dek, M.: Hardening networks against strategic attackers using attack graph games. Comput. Secur. 87, 101578 (2019)","DOI":"10.1016\/j.cose.2019.101578"},{"key":"8_CR22","unstructured":"Durkota, K., Lis\u1ef3, V., Kiekintveld, C., Bo\u0161ansk\u1ef3, B., P\u011bchou\u010dek, M.: Case studies of network defense with attack graph games. Intell. Syst. 31(5), 24\u201330 (2016)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Elsken, T., Metzen, J.H., Hutter, F.: Neural architecture search: a survey. J. Mach. Learn. Res. 20 (2019)","DOI":"10.1007\/978-3-030-05318-5_3"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Erd\u0151s, P., R\u00e9nyi, A.: On Random Graphs. Publicationes Mathematicae Debrecen, vol. 6 (1959)","DOI":"10.5486\/PMD.1959.6.3-4.12"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Fang, F., et al.: PAWS-a deployed game-theoretic application to combat poaching. AI Mag. 38(1), 23\u201336 (2017)","DOI":"10.1609\/aimag.v38i1.2710"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Feldman, M., Naor, J., Schwartz, R.: A unified continuous greedy algorithm for submodular maximization. In: Annual Symposium on Foundations of Computer Science (2011)","DOI":"10.1109\/FOCS.2011.46"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Garg, N., Grosu, D.: Deception in honeynets: a game-theoretic analysis. In: Information Assurance and Security Workshop (2007)","DOI":"10.1109\/IAW.2007.381921"},{"key":"8_CR28","unstructured":"Gurobi Optimization, LLC: Gurobi optimizer reference manual (2020)"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Hor\u00e1k, K., Zhu, Q., Bo\u0161ansk\u1ef3, B.: Manipulating adversary\u2019s belief: a dynamic game approach to deception by design for proactive network security. In: Conference on Decision and Game Theory for Security (2017)","DOI":"10.1007\/978-3-319-68711-7_15"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"IBM Security: Cost of a data breach report 2019 (2019). https:\/\/ibm.co\/2CPsVnV","DOI":"10.1016\/S1361-3723(19)30081-8"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: Annual Computer Security Applications Conference (2006)","DOI":"10.1109\/ACSAC.2006.39"},{"key":"8_CR32","unstructured":"Instructables: how to make your bike look an ugly discouragement for thieves (2015). https:\/\/rb.gy\/kb384b"},{"key":"8_CR33","unstructured":"Jain, M., Korzhyk, D., Van\u011bk, O., Conitzer, V., P\u011bchou\u010dek, M., Tambe, M.: A double oracle algorithm for zero-sum security games on graphs. In: International Conference on Autonomous Agents and Multiagent Systems (2011)"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S.: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, vol. 54. Springer Science & Business Media (2011)","DOI":"10.1007\/978-1-4614-0977-9"},{"key":"8_CR35","unstructured":"Jajodia, S., Noel, S., O\u2019berry, B.: Topological analysis of network attack vulnerability. In: Managing Cyber Threats (2005)"},{"key":"8_CR36","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"8_CR37","unstructured":"Kreibich, C., Crowcroft, J.: Honeycomb: creating intrusion detection signatures using honeypots. Comput. Commun. Rev. 34(1), 51\u201356 (2004)"},{"key":"8_CR38","unstructured":"Kuipers, D., Fabro, M.: Control systems cyber security: defense in depth strategies. Technical report, Idaho Nat. Labo. (2006)"},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Liu, Y., Man, H.: Network vulnerability assessment using Bayesian networks. In: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2005)","DOI":"10.1117\/12.604240"},{"key":"8_CR40","unstructured":"McKelvey, R.D., Palfrey, T.R.: Quantal response equilibria for normal form games. Games Econ. Behav. 10(1), 6\u201338 (1995)"},{"key":"8_CR41","unstructured":"Mee, P., Schuermann, T.: How a cyber attack could cause the next financial crisis (2018). https:\/\/bit.ly\/3f2lOFP"},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Mezura-Montes, E., Vel\u00e1zquez-Reyes, J., Coello Coello, C.A.: A comparative study of differential evolution variants for global optimization. In: Annual Conference on Genetic and Evolutionary Computation (2006)","DOI":"10.1145\/1143997.1144086"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Miah, M.S., Gutierrez, M., Veliz, O., Thakoor, O., Kiekintveld, C.: Concealing cyber-decoys using two-sided feature deception games. In: International Conference on System Sciences (2020)","DOI":"10.24251\/HICSS.2020.235"},{"key":"8_CR44","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Wright, M., Wellman, M.P., Baveja, S.: Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis. Secur. Commun. Netw. (2018)","DOI":"10.1155\/2018\/2864873"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. In: Workshop on Visualization and Data Mining for Computer Security (2004)","DOI":"10.1145\/1029208.1029225"},{"key":"8_CR46","unstructured":"Noel, S., Jajodia, S., O\u2019Berry, B., Jacobs, M.: Efficient minimum-cost network hardening via exploit dependency graphs. In: Computer Security Applications Conference (2003)"},{"key":"8_CR47","unstructured":"Paszke, A., et al.: Pytorch: an imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems (2019)"},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Pawlick, J., Colbert, E., Zhu, Q.: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. Comput. Surv. 52(4), 1\u201328 (2019)","DOI":"10.1145\/3337772"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Workshop on New Security Paradigms (1998)","DOI":"10.1145\/310889.310919"},{"key":"8_CR50","unstructured":"Pita, J., Jain, M., Ord\u00f3nez, F., Portway, C., Tambe, M., Western, C., et al.: Armor security for Los Angeles International Airport. In: AAAI Conference on AI (2008)"},{"key":"8_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-319-60080-2_20","volume-title":"Cyber Security Cryptography and Machine Learning","author":"H Polad","year":"2017","unstructured":"Polad, H., Puzis, R., Shapira, B.: Attack graph obfuscation. In: Dolev, S., Lodha, S. (eds.) CSCML 2017. LNCS, vol. 10332, pp. 269\u2013287. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60080-2_20"},{"key":"8_CR52","unstructured":"Schlenker, A., et al.: Deceiving cyber adversaries: a game theoretic approach. In: International Conference on Autonomous Agents and Multiagent Systems (2018)"},{"key":"8_CR53","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s J. 24, 12 (1999)"},{"key":"8_CR54","unstructured":"Shen, W., Tang, P., Zuo, S.: Automated mechanism design via neural networks. In: International Conference on Autonomous Agents and Multiagent Systems (2019)"},{"key":"8_CR55","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: IEEE Symposium on Security and Privacy (2002)"},{"key":"8_CR56","unstructured":"Shi, Z.R., et al.: Learning and planning in feature deception games. arXiv preprint arXiv:1905.04833 (2019)"},{"key":"8_CR57","doi-asserted-by":"crossref","unstructured":"Shi, Z.R., Tang, Z., Tran-Thanh, L., Singh, R., Fang, F.: Designing the game to play: optimizing payoff structure in security games. In: International Joint Conference on Artificial Intelligence (2018)","DOI":"10.24963\/ijcai.2018\/71"},{"key":"8_CR58","unstructured":"Shieh, E., et al.: Protect: a deployed game theoretic system to protect the ports of the United States. In: International Conference on Autonomous Agents and Multiagent Systems (2012)"},{"key":"8_CR59","doi-asserted-by":"crossref","unstructured":"Shieh, E., et al.: Protect in the ports of Boston, New York and beyond: experiences in deploying Stackelberg security games with quantal response. In: Handbook Computational Approaches to Counterterrorism (2013)","DOI":"10.1007\/978-1-4614-5311-6_20"},{"key":"8_CR60","unstructured":"Stallings, W., Brown, L., Bauer, M.D., Bhattacharjee, A.K.: Computer Security: Principles and Practice (2012)"},{"key":"8_CR61","doi-asserted-by":"crossref","unstructured":"Storn, R., Price, K.: Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. J. Global Optim. 11(4), 341\u2013359 (1997)","DOI":"10.1023\/A:1008202821328"},{"key":"8_CR62","doi-asserted-by":"crossref","unstructured":"Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems. Lessons Learned. Cambridge University Press, Cambridge (2011)","DOI":"10.1017\/CBO9780511973031"},{"key":"8_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-030-32430-8_31","volume-title":"Decision and Game Theory for Security","author":"O Thakoor","year":"2019","unstructured":"Thakoor, O., Tambe, M., Vayanos, P., Xu, H., Kiekintveld, C., Fang, F.: Cyber camouflage games for strategic deception. In: Alpcan, T., Vorobeychik, Y., Baras, J.S., D\u00e1n, G. (eds.) GameSec 2019. LNCS, vol. 11836, pp. 525\u2013541. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32430-8_31"},{"key":"8_CR64","unstructured":"Virtanen, P., et al.: Scipy 1.0: fundamental algorithms for scientific computing in python. Nat. Methods 17(3), 261\u2013272 (2020)"},{"key":"8_CR65","doi-asserted-by":"crossref","unstructured":"Wright, M., Wang, Y., Wellman, M.P.: Iterated deep reinforcement learning in games: history-aware training for improved stability. In: ACM Conference on Economics and Computation (2019)","DOI":"10.1145\/3328526.3329634"},{"key":"8_CR66","unstructured":"Zhuang, J., Bier, V.M.: Reasons for secrecy and deception in homeland-security resource allocation. Risk Anal. Int. J. 30(12), 1737\u20131743 (2010)"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64793-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T06:33:05Z","timestamp":1670481185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64793-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030647926","9783030647933"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64793-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"College Park, MD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"He conference was held virtueally due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}