{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:43:27Z","timestamp":1743122607627,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030755287"},{"type":"electronic","value":"9783030755294"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75529-4_1","type":"book-chapter","created":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T19:02:43Z","timestamp":1621969363000},"page":"3-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Quantified Analysis of Security Issues and Its Mitigation in Blockchain Using Game Theory"],"prefix":"10.1007","author":[{"given":"Ashis Kumar","family":"Samanta","sequence":"first","affiliation":[]},{"given":"Bidyut Biman","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Nabendu","family":"Chaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,26]]},"reference":[{"key":"1_CR1","unstructured":"Pindyck, R.S., Rubinfeld, D.L.: Microeconomics, 8th edn. The Pearson Series in Economics (2013). ISBN-13: 978-0-13-285712-3"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-981-13-8775-3_10","volume-title":"Advanced Applications of Blockchain Technology","author":"N Gupta","year":"2020","unstructured":"Gupta, N.: Security and privacy issues of blockchain technology. In: Kim, S., Deka, G.C. (eds.) Advanced Applications of Blockchain Technology, pp. 207\u2013226. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-13-8775-3_10"},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"2035","DOI":"10.1007\/s10586-020-03046-w","volume":"23","author":"R Singh","year":"2020","unstructured":"Singh, R., Dwivedi, A., Srivastava, G., et al.: A game theoretic analysis of resource mining in blockchain. Cluster Comput. 23(3), 2035\u20132046 (2020). https:\/\/doi.org\/10.1007\/s10586-020-03046-w","journal-title":"Cluster Comput."},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-662-44774-1_6","volume-title":"Financial Cryptography and Data Security","author":"B Johnson","year":"2014","unstructured":"Johnson, B., Laszka, A., Grossklags, J., Vasek, M., Moore, T.: Game-theoretic analysis of DDoS attacks against bitcoin mining pools. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 72\u201386. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_6"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1007\/978-3-030-01177-2_81","volume-title":"Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume 2","author":"M Nojoumian","year":"2019","unstructured":"Nojoumian, M., Golchubian, A., Njilla, L., Kwiat, K., Kamhoua, C.: Incentivizing blockchain miners to avoid dishonest mining strategies by a reputation-based paradigm. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) Intelligent Computing: Proceedings of the 2018 Computing Conference, Volume 2, pp. 1118\u20131134. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-01177-2_81"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-662-48051-9_5","volume-title":"Financial Cryptography and Data Security","author":"A Laszka","year":"2015","unstructured":"Laszka, A., Johnson, B., Grossklags, J.: When bitcoin mining pools run dry. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) Financial Cryptography and Data Security, pp. 63\u201377. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48051-9_5"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Xu, D., Xiao, L., Sun, L., Lei, M.: Game theoretic study on blockchain based secure edge networks. In: IEEE\/CIC International Conference on Communications in China (ICCC), Qingdao, pp. 1\u20135. IEEE (2017). https:\/\/doi.org\/10.1109\/ICCChina.2017.8330529","DOI":"10.1109\/ICCChina.2017.8330529"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-030-01554-1_27","volume-title":"Decision and Game Theory for Security: 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29\u201331, 2018, Proceedings","author":"N Alzahrani","year":"2018","unstructured":"Alzahrani, N., Bulusu, N.: Towards True decentralization: a blockchain consensus protocol based on game theory and randomness. In: Bushnell, L., Poovendran, R., Ba\u015far, T. (eds.) Decision and Game Theory for Security: 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29\u201331, 2018, Proceedings, pp. 465\u2013485. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01554-1_27"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-662-58820-8_20","volume-title":"Financial Cryptography and Data Security","author":"L Chen","year":"2019","unstructured":"Chen, L., et al.: The game among bribers in a smart contract system. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 294\u2013307. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_20"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"106587","DOI":"10.1016\/j.compeleceng.2020.106587,Elsevier","volume":"83","author":"S Xuan","year":"2020","unstructured":"Xuan, S., Zheng, L., Chung, I., Wang, W., Man, D., Du, X., et al.: An incentive mechanism for data sharing based on blockchain with smart contracts. Comput. Electr. Eng. 83, 106587 (2020). https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106587,Elsevier","journal-title":"Comput. Electr. Eng."},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-319-25527-9_11","volume-title":"Programming Languages with Applications to Biology and Security","author":"G Bigi","year":"2015","unstructured":"Bigi, G., Bracciali, A., Meacci, G., Tuosto, E.: Validation of decentralised smart contracts through game theory and formal methods. In: Bodei, C., Ferrari, G., Priami, C. (eds.) Programming Languages with Applications to Biology and Security, pp. 142\u2013161. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25527-9_11"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Tsabary, I., Eyal, I.: The gap game. In: 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, USA, Canada (2018). https:\/\/doi.org\/10.1145\/3243734.3243737","DOI":"10.1145\/3243734.3243737"},{"key":"1_CR13","unstructured":"https:\/\/drive.google.com\/drive\/folders\/1aLM7MmyEwEmx_NzCfAMIn4trd0Bl62fp?usp=sharing"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence in Communications and Business Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75529-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T19:03:14Z","timestamp":1621969394000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75529-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030755287","9783030755294"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75529-4_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICBA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Intelligence in Communications and Business Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiniketan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicba2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cicba.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"84","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.44","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.54","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}