{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T13:52:36Z","timestamp":1774360356852,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031773815","type":"print"},{"value":"9783031773822","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-77382-2_9","type":"book-chapter","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T19:26:04Z","timestamp":1732562764000},"page":"144-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Partially-Observable Security Games for\u00a0Attack-Defence Analysis in\u00a0Software Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0377-5595","authenticated-orcid":false,"given":"Narges","family":"Khakpour","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4137-8862","authenticated-orcid":false,"given":"David","family":"Parker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,26]]},"reference":[{"issue":"3","key":"9_CR1","doi-asserted-by":"publisher","first-page":"3438","DOI":"10.1109\/TNSM.2022.3179965","volume":"19","author":"AH Anwar","year":"2022","unstructured":"Anwar, A.H., Kamhoua, C.A., Leslie, N.O., Kiekintveld, C.: Honeypot allocation for cyber deception under uncertainty. IEEE Trans. Netw. Serv. Manag. 19(3), 3438\u20133452 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Aslanyan, Z., Nielson, F., Parker, D.: Quantitative verification and synthesis of attack-defence scenarios. In: Proc. CSF\u201916, pp. 105\u2013119 (2016)","DOI":"10.1109\/CSF.2016.15"},{"key":"9_CR3","unstructured":"Behrmann, G., Cougnard, A., David, A., Fleury, E., Larsen, K.G., Lime, D.: UPPAAL TIGA user-manual. Aalborg University (2007)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75227-1_1","volume-title":"Formal Aspects in Security and Trust","author":"S Bistarelli","year":"2007","unstructured":"Bistarelli, S., Dall\u2019Aglio, M., Peretti, P.: Strategic games on defense trees. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 1\u201315. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75227-1_1"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-030-59152-6_16","volume-title":"Automated Technology for Verification and Analysis","author":"A Bork","year":"2020","unstructured":"Bork, A., Junges, S., Katoen, J.-P., Quatmann, T.: Verification of indefinite-horizon POMDPs. In: Hung, D.V., Sokolsky, O. (eds.) ATVA 2020. LNCS, vol. 12302, pp. 288\u2013304. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59152-6_16"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-030-99527-0_2","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A Bork","year":"2022","unstructured":"Bork, A., Katoen, J.-P., Quatmann, T.: Under-approximating expected total rewards in POMDPs. In: TACAS 2022. LNCS, vol. 13244, pp. 22\u201340. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99527-0_2"},{"key":"9_CR7","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2021.XVII.079","volume-title":"Safe policies for factored partially observable stochastic games","author":"S Carr","year":"2021","unstructured":"Carr, S., Jansen, N., Bharadwaj, S., Spaan, M.T., Topcu, U.: Safe policies for factored partially observable stochastic games. Science and System XVII, In Robotics (2021)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Cassez, F., David, A., Larsen, K.G., Lime, D., Raskin, J.: Timed control with observation based and stuttering invariant strategies. In: Proc. ATVA\u201907, pp. 192\u2013206 (2007)","DOI":"10.1007\/978-3-540-75596-8_15"},{"key":"9_CR9","unstructured":"Chatterjee, K., Chmelik, M., Tracol, M.: What is decidable about partially observable Markov decision processes with omega-regular objectives. In: Proc. CSL\u201913, pp. 165\u2013180 (2013)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Chatterjee, K., Doyen, L.: Partial-observation stochastic games: How to win when belief fails. ACM Trans. Comput. Log. 15(2), 16:1\u201316:44 (2014)","DOI":"10.1145\/2579821"},{"issue":"2","key":"9_CR11","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/s10703-012-0164-2","volume":"43","author":"K Chatterjee","year":"2013","unstructured":"Chatterjee, K., Doyen, L., Henzinger, T.A.: A survey of partial-observation stochastic parity games. Formal Methods Syst. Des. 43(2), 268\u2013284 (2013)","journal-title":"Formal Methods Syst. Des."},{"issue":"1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s10703-013-0183-7","volume":"43","author":"T Chen","year":"2013","unstructured":"Chen, T., Forejt, V., Kwiatkowska, M., Parker, D., Simaitis, A.: Automatic verification of competitive stochastic systems. Formal Methods Syst. Des. 43(1), 61\u201392 (2013)","journal-title":"Formal Methods Syst. Des."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Chowdhary, A., Sengupta, S., Alshamrani, A., Huang, D., Sabur, A.: Adaptive MTD security using Markov game modeling. In: International Conference on Computing, Networking and Communications, ICNC 2019, Honolulu, HI, USA, February 18-21, 2019, pp. 577\u2013581 (2019)","DOI":"10.1109\/ICCNC.2019.8685647"},{"key":"9_CR14","unstructured":"Durkota, K., Lis\u00fd, V., Bosansk\u00fd, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Proc. IJCAI\u201915, pp. 526\u2013532 (2015)"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-030-30281-8_12","volume-title":"Quantitative Evaluation of Systems","author":"J Eisentraut","year":"2019","unstructured":"Eisentraut, J., K\u0159et\u00ednsk\u00fd, J.: Expected cost analysis of attack-defense trees. In: Parker, D., Wolf, V. (eds.) QEST 2019. LNCS, vol. 11785, pp. 203\u2013221. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30281-8_12"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Gadyatskaya, O., Hansen, R.R., Larsen, K.G., \u00a0Legay, A., Olesen, M.C., Poulsen, D.B.: Modelling attack-defense trees using timed automata. In: Proc. FORMATS\u201916, pp. 35\u201350 (2016)","DOI":"10.1007\/978-3-319-44878-7_3"},{"issue":"4","key":"9_CR17","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s10009-021-00633-z","volume":"24","author":"C Hensel","year":"2022","unstructured":"Hensel, C., Junges, S., Katoen, J., Quatmann, T., Volk, M.: The probabilistic model checker storm. Int. J. Softw. Tools Technol. Transf. 24(4), 589\u2013610 (2022)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2017.09.001","volume":"26","author":"JB Hong","year":"2017","unstructured":"Hong, J.B., Kim, D.S., Chung, C.-J., Huang, D.: A survey on the usability and practical applications of graphical security models. Comput. Sci. Rev. 26, 1\u201316 (2017)","journal-title":"Comput. Sci. Rev."},{"issue":"2","key":"9_CR19","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.ejor.2023.04.009","volume":"313","author":"K Hunt","year":"2024","unstructured":"Hunt, K., Zhuang, J.: A review of attacker-defender games: Current state and paths forward. Eur. J. Oper. Res. 313(2), 401\u2013417 (2024)","journal-title":"Eur. J. Oper. Res."},{"key":"9_CR20","unstructured":"Khakpour, N., \u00a0Parker, D.: Partially-observable security games for attack-defence analysis in software systems. CoRR, abs\/2211.01508 (2022)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Khakpour, N.,\u00a0Skandylas, C., Nariman, G.S., \u00a0Weyns, D.: Towards secure architecture-based adaptations. In: Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS@ICSE 2019, Montreal, QC, Canada, May 25-31, 2019, pp. 114\u2013125, 2019","DOI":"10.1109\/SEAMS.2019.00023"},{"key":"9_CR22","first-page":"03","volume":"13","author":"B Kordy","year":"2013","unstructured":"Kordy, B., Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Schweitzer, P.: DAG-based attack and defense modeling: Don\u2019t miss the forest for the attack trees. Comput. Sci. Rev. 13, 03 (2013)","journal-title":"Comput. Sci. Rev."},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-030-53291-8_25","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2020","unstructured":"Kwiatkowska, M., Norman, G., Parker, D., Santos, G.: PRISM-games 3.0: stochastic game verification with concurrency, equilibria and time. In: Lahiri, S.K., Wang, C. (eds.) CAV 2020. LNCS, vol. 12225, pp. 475\u2013487. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-53291-8_25"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_47"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Manshaei, M.H., \u00a0Zhu, Q., \u00a0Alpcan, T., \u00a0Basar, T., \u00a0Hubaux, J.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3):25:1\u201325:39 (2013)","DOI":"10.1145\/2480741.2480742"},{"issue":"3","key":"9_CR26","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/s11241-017-9269-4","volume":"53","author":"G Norman","year":"2017","unstructured":"Norman, G., Parker, D., Zou, X.: Verification and control of partially observable probabilistic systems. Real-Time Syst. 53(3), 354\u2013402 (2017)","journal-title":"Real-Time Syst."},{"key":"9_CR27","unstructured":"Ou, X., \u00a0Govindavajhala, S., Appel, A.W.: Mulval: A logic-based network security analyzer. In: Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14, SSYM\u201905, p. 8, Berkeley, CA, USA, 2005. USENIX Association (2005)"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Sheyner, O., \u00a0Haines, J., Jha, S., \u00a0Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 273\u2013284. IEEE (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"9_CR29","unstructured":"Simaitis, A.: Automatic Verification of Competitive Stochastic Systems. PhD thesis, Department of Computer Science, University of Oxford (2014)"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Skandylas, C., \u00a0Khakpour, N., \u00a0C\u00e1mara, J.: Security countermeasure selection for component-based software-intensive systems. In: 22nd IEEE International Conference on Software Quality, Reliability and Security, QRS 2022, Guangzhou, China, December 5-9, 2022, pp. 63\u201372. IEEE (2022)","DOI":"10.1109\/QRS57517.2022.00017"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Wang, L., \u00a0Islam, T., \u00a0Long, T., \u00a0Singhal, A., \u00a0Jajodia, S.: An attack graph-based probabilistic security metric. In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 283\u2013296 (2008)","DOI":"10.1007\/978-3-540-70567-3_22"},{"key":"9_CR32","unstructured":"Weiss, J.D.: A system security engineering process. In: Proceedings of the 14th National Computer Security Conference, vol. 249, pp. 572\u2013581 (1991)"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Wide\u0142, W., \u00a0Audinot, M., \u00a0Fila, B., \u00a0Pinchinat, S.: Beyond 2014: Formal methods for attack tree\u2013based security modeling. ACM Comput. Surv. 52(4), 75:1\u201375:36 (2019)","DOI":"10.1145\/3331524"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Winterer, L., et al.: Motion planning under partial observability using game-based abstraction. In: 56th IEEE Annual Conference on Decision and Control, CDC 2017, Melbourne, Australia, December 12-15, 2017, pp. 2201\u20132208 (2017)","DOI":"10.1109\/CDC.2017.8263971"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77382-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T20:02:50Z","timestamp":1732564970000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77382-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"ISBN":["9783031773815","9783031773822"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77382-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,26]]},"assertion":[{"value":"26 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEFM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Engineering and Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aveiro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sefm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sefm-conference.github.io\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}