{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:56:33Z","timestamp":1762325793425,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031506697"},{"type":"electronic","value":"9783031506703"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-50670-3_11","type":"book-chapter","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T13:02:36Z","timestamp":1703768556000},"page":"215-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Optimal Resource Allocation for\u00a0Proactive Defense with\u00a0Deception in\u00a0Probabilistic Attack Graphs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3823-385X","authenticated-orcid":false,"given":"Haoxiang","family":"Ma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2204-6256","authenticated-orcid":false,"given":"Shuo","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2169-5975","authenticated-orcid":false,"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4470-2827","authenticated-orcid":false,"given":"Jie","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,29]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9781315140223","volume-title":"Constrained Markov Decision Processes: Stochastic Modeling","author":"E Altman","year":"2021","unstructured":"Altman, E.: Constrained Markov Decision Processes: Stochastic Modeling, 1st edn. Routledge, Boca Raton (2021)","edition":"1"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Anwar, A.H., Kamhoua, C., Leslie, N.: Honeypot allocation over attack graphs in cyber deception games. In: 2020 International Conference on Computing, Networking and Communications (ICNC), pp. 502\u2013506 (2020)","DOI":"10.1109\/ICNC47757.2020.9049764"},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1006\/game.1997.0514","volume":"18","author":"HC Chen","year":"1997","unstructured":"Chen, H.C., Friedman, J.W., Thisse, J.F.: Boundedly rational nash equilibrium: a probabilistic choice approach. Games Econom. Behav. 18(1), 32\u201354 (1997)","journal-title":"Games Econom. Behav."},{"key":"11_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52119-6","volume-title":"Bilevel Optimization","author":"S Dempe","year":"2020","unstructured":"Dempe, S., Zemkoho, A.: Bilevel Optimization. Springer, Cham (2020)"},{"key":"11_CR5","unstructured":"Durkota, K., Lis\u1ef3, V., Bo\u0161ansk\u1ef3, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)"},{"issue":"5","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1137\/0913069","volume":"13","author":"P Hansen","year":"1992","unstructured":"Hansen, P., Jaumard, B., Savard, G.: New branch-and-bound rules for linear bilevel programming. SIAM J. Sci. Stat. Comput. 13(5), 1194\u20131217 (1992)","journal-title":"SIAM J. Sci. Stat. Comput."},{"key":"11_CR7","unstructured":"Hong, J., Kim, D.S.: HARMs: hierarchical attack representation models for network security analysis. In: Australian Information Security Management Conference, p. 9. SRI Security Research Institute, Edith Cowan University, Perth, Western Australia (2012)"},{"issue":"2","key":"11_CR8","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TDSC.2015.2443790","volume":"13","author":"JB Hong","year":"2016","unstructured":"Hong, J.B., Kim, D.S.: Assessing the effectiveness of moving target defenses using security models. IEEE Trans. Dependable Secure Comput. 13(2), 163\u2013177 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"11_CR9","unstructured":"Jha, S., Sheyner, O., Wing, J.: Two formal analyses of attack graphs. In: Proceedings 15th IEEE Computer Security Foundations Workshop, CSFW-15, pp. 49\u201363 (2002)"},{"key":"11_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100219","volume":"35","author":"HS Lallie","year":"2020","unstructured":"Lallie, H.S., Debattista, K., Bal, J.: A review of attack graph and attack tree visual syntax in cyber security. Comput. Sci. Rev. 35, 100219 (2020)","journal-title":"Comput. Sci. Rev."},{"key":"11_CR11","unstructured":"Madani, O.: On policy iteration as a newton\u2019s method and polynomial policy iteration algorithms. In: Eighteenth National Conference on Artificial Intelligence, pp. 273\u2013278. American Association for Artificial Intelligence, USA (2002)"},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0899-8256(02)00014-3","volume":"41","author":"LG Mattsson","year":"2002","unstructured":"Mattsson, L.G., Weibull, J.W.: Probabilistic choice and procedurally bounded rationality. Games Econom. Behav. 41(1), 61\u201378 (2002)","journal-title":"Games Econom. Behav."},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-030-64793-3_8","volume-title":"Decision and Game Theory for Security","author":"S Milani","year":"2020","unstructured":"Milani, S., et al.: Harnessing the power of deception in attack graph-based security games. In: Zhu, Q., Baras, J.S., Poovendran, R., Chen, J. (eds.) GameSec 2020. LNCS, vol. 12513, pp. 147\u2013167. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64793-3_8"},{"key":"11_CR14","unstructured":"Nachum, O., Norouzi, M., Xu, K., Schuurmans, D.: Bridging the gap between value and policy based reinforcement learning. In: Advances in Neural Information Processing Systems, vol. 30. Curran Associates, Inc. (2017)"},{"key":"11_CR15","first-page":"1","volume":"2018","author":"TH Nguyen","year":"2018","unstructured":"Nguyen, T.H., Wright, M., Wellman, M.P., Singh, S.: Multistage attack graph security games: heuristic strategies, with empirical game-theoretic analysis. Secur. Commun. Netw. 2018, 1\u201328 (2018)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"11_CR16","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10922-008-9109-x","volume":"16","author":"S Noel","year":"2008","unstructured":"Noel, S., Jajodia, S.: Optimal ids sensor placement and alert prioritization using attack graphs. J. Netw. Syst. Manage. 16(3), 259\u2013275 (2008)","journal-title":"J. Netw. Syst. Manage."},{"issue":"1","key":"11_CR17","first-page":"135","volume":"1","author":"S Noel","year":"2010","unstructured":"Noel, S., Jajodia, S., Wang, L., Singhal, A.: Measuring security risk of networks using attack graphs. Int. J. Next-Gener. Comput. 1(1), 135\u2013147 (2010)","journal-title":"Int. J. Next-Gener. Comput."},{"key":"11_CR18","volume-title":"Markov Decision Processes: Discrete Stochastic Dynamic Programming","author":"ML Puterman","year":"2014","unstructured":"Puterman, M.L.: Markov Decision Processes: Discrete Stochastic Dynamic Programming. Wiley, Hoboken (2014)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 273\u2013284. IEEE (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-319-66505-4_3","volume-title":"Network Security Metrics","author":"A Singhal","year":"2017","unstructured":"Singhal, A., Ou, X.: Security risk analysis of enterprise networks using probabilistic attack graphs. In: Wang, L., Jajodia, S., Singhal, A. (eds.) Network Security Metrics, pp. 53\u201373. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66505-4_3"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Sinha, A., Fang, F., An, B., Kiekintveld, C., Tambe, M.: Stackelberg security games: looking beyond a decade of success. In: Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI 2018), Stockholm, Sweden, 13\u201319 July, pp. 5494\u20135501 (2018)","DOI":"10.24963\/ijcai.2018\/775"},{"key":"11_CR22","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-030-32430-8_31","volume-title":"Decision and Game Theory for Security","author":"O Thakoor","year":"2019","unstructured":"Thakoor, O., Tambe, M., Vayanos, P., Xu, H., Kiekintveld, C., Fang, F.: Cyber camouflage games for strategic deception. In: Alpcan, T., Vorobeychik, Y., Baras, J.S., D\u00e1n, G. (eds.) Decision and Game Theory for Security. LNCS, vol. 11836, pp. 525\u2013541. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-32430-8_31"},{"key":"11_CR23","unstructured":"Ziebart, B.D., Maas, A.L., Bagnell, J.A., Dey, A.K., et al.: Maximum entropy inverse reinforcement learning. In: AAAI, Chicago, IL, USA, vol. 8, pp. 1433\u20131438 (2008)"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50670-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T23:54:50Z","timestamp":1730937290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50670-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031506697","9783031506703"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50670-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Avignon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}