{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:42:16Z","timestamp":1760305336444,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032080660"},{"type":"electronic","value":"9783032080677"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08067-7_12","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:37:40Z","timestamp":1760301460000},"page":"228-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Gestalt Game-Theoretic Framework for\u00a0Designing Agentic AI Workflows in\u00a0Cyber Deception"],"prefix":"10.1007","author":[{"given":"Muhammad Akram","family":"Al Bari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0008-2953","authenticated-orcid":false,"given":"Quanyan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"12_CR1","unstructured":"Antonakakis, M., et\u00a0al.: Understanding the mirai botnet. In: Proceedings of the 26th USENIX Security Symposium, pp. 1093\u20131110. USENIX Association, Vancouver, BC, Canada (Aug 2017)"},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Chandler, J., Fisher, K., Chapman, E., Davis, E., Wick, A.: Invasion of the botnet snatchers: a case study in applied malware cyberdeception. In: Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS), pp. 1855\u20131864 (2020). https:\/\/doi.org\/10.24251\/HICSS.2020.229","DOI":"10.24251\/HICSS.2020.229"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Chen, J., Zhu, Q.: Security investment under cognitive constraints: a gestalt nash equilibrium approach. In: 2018 52nd Annual Conference on Information Sciences and Systems (CISS), pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/CISS.2018.8362263"},{"issue":"9","key":"12_CR4","doi-asserted-by":"publisher","first-page":"2412","DOI":"10.1109\/TIFS.2019.2898817","volume":"14","author":"MJ Farooq","year":"2019","unstructured":"Farooq, M.J., Zhu, Q.: Modeling, analysis, and mitigation of dynamic botnet formation in wireless Iot networks. IEEE Trans. Inf. Forensics Secur. 14(9), 2412\u20132426 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-030-32430-8_13","volume-title":"Decision and Game Theory for Security","author":"L Huang","year":"2019","unstructured":"Huang, L., Zhu, Q.: Adaptive honeypot engagement through reinforcement learning of semi-Markov decision processes. In: Alpcan, T., Vorobeychik, Y., Baras, J.S., D\u00e1n, G. (eds.) GameSec 2019. LNCS, vol. 11836, pp. 196\u2013216. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32430-8_13"},{"key":"12_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103792","volume":"140","author":"A Javadpour","year":"2024","unstructured":"Javadpour, A., Ja\u2019fari, F., Taleb, T., Shojafar, M., Benza\u00efd, C.: A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput. Secur. 140, 103792 (2024). https:\/\/doi.org\/10.1016\/j.cose.2024.103792","journal-title":"Comput. Secur."},{"key":"12_CR7","unstructured":"Li, T., Zhu, Q.: Symbiotic game and foundation models for cyber deception operations in strategic cyber warfare. arXiv preprint arXiv:2403.10570 (2024)"},{"key":"12_CR8","unstructured":"Miehling, E., et\u00a0al.: Agentic AI needs a systems theory. arXiv preprint arXiv:2503.00237 (2025)"},{"issue":"2","key":"12_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MIS.2025.3544940","volume":"40","author":"S Murugesan","year":"2025","unstructured":"Murugesan, S.: The rise of agentic AI: implications, concerns, and the path forward. IEEE Intell. Syst. 40(2), 8\u201314 (2025)","journal-title":"IEEE Intell. Syst."},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"49153","DOI":"10.1109\/ACCESS.2023.3277397","volume":"11","author":"MW Nadeem","year":"2023","unstructured":"Nadeem, M.W., Goh, H.G., Aun, Y., Ponnusamy, V.: Detecting and mitigating botnet attacks in software-defined networks using deep learning techniques. IEEE Access 11, 49153\u201349170 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3277397","journal-title":"IEEE Access"},{"key":"12_CR11","unstructured":"Nunez, A., Ayoka, J., Islam, M.Z., Ruiz, P.: Software defined networking: An overview. arXiv preprint arXiv:2302.00165 (Feb 2023), version 1, submitted to arXiv on February 1"},{"issue":"6","key":"12_CR12","doi-asserted-by":"publisher","first-page":"1654","DOI":"10.1109\/TIFS.2018.2883272","volume":"14","author":"J Pawlick","year":"2018","unstructured":"Pawlick, J., Chen, J., Zhu, Q.: iSTRICT: an interdependent strategic trust mechanism for the cloud-enabled internet of controlled things. IEEE Trans. Inf. Forensics Secur. 14(6), 1654\u20131669 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-319-25594-1_16","volume-title":"Decision and Game Theory for Security","author":"J Pawlick","year":"2015","unstructured":"Pawlick, J., Farhang, S., Zhu, Q.: Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 289\u2013308. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25594-1_16"},{"issue":"12","key":"12_CR14","doi-asserted-by":"publisher","first-page":"2906","DOI":"10.1109\/TIFS.2017.2725224","volume":"12","author":"J Pawlick","year":"2017","unstructured":"Pawlick, J., Zhu, Q.: Strategic trust in cloud-enabled cyber-physical systems with an application to glucose control. IEEE Trans. Inf. Forensics Secur. 12(12), 2906\u20132919 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR15","unstructured":"de\u00a0Jesus Coelho\u00a0da Silva, G., Westphall, C.B.: A survey of large language models in cybersecurity. arXiv preprint arXiv:2402.16968 (2024)"},{"issue":"4","key":"12_CR16","doi-asserted-by":"publisher","first-page":"2678","DOI":"10.1109\/JIOT.2021.3081751","volume":"9","author":"O Tsemogne","year":"2022","unstructured":"Tsemogne, O., Hayel, Y., Kamhoua, C., Deugou\u00e9, G.: Game-theoretic modeling of cyber deception against epidemic botnets in internet of things. IEEE Internet Things J. 9(4), 2678\u20132687 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3081751","journal-title":"IEEE Internet Things J."},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"13958","DOI":"10.1109\/ACCESS.2018.2814481","volume":"6","author":"Q Zhu","year":"2018","unstructured":"Zhu, Q., Rass, S.: On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats. IEEE Access 6, 13958\u201313971 (2018)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Game Theory and AI for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08067-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:02:48Z","timestamp":1760302968000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08067-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032080660","9783032080677"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08067-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Game Theory and AI for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}