{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:42:31Z","timestamp":1760305351350,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032080660"},{"type":"electronic","value":"9783032080677"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08067-7_5","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:37:25Z","timestamp":1760301445000},"page":"81-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Strategic Defense Allocation in\u00a0Cyber-Physical Sensor Systems Under Dual-Domain Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8201-4710","authenticated-orcid":false,"given":"Ahmad Bilal","family":"Asghar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8907-3043","authenticated-orcid":false,"given":"Ahmed","family":"Hemida","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2169-5975","authenticated-orcid":false,"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1929-2512","authenticated-orcid":false,"given":"Jon","family":"Kleinberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Anwar, A.H., Kamhoua, C., Leslie, N.: Honeypot allocation over attack graphs in cyber deception games. In: Int\u2019l Conference on Computing, Networking and Communications, pp. 502\u2013506 (2020)","key":"5_CR1","DOI":"10.1109\/ICNC47757.2020.9049764"},{"doi-asserted-by":"crossref","unstructured":"Anwar, A.H., Kamhoua, C.: Game theory on attack graph for cyber deception. In: Int\u2019l Conference on Decision and Game Theory for Security. Springer (2020)","key":"5_CR2","DOI":"10.1007\/978-3-030-64793-3_24"},{"doi-asserted-by":"crossref","unstructured":"Asghar, A.B., Hemida, A., Kamhoua, C., Kleinberg, J.: A scalable double-oracle algorithm for multi-domain deception game. In: 2024 IEEE Conference on Communications and Network Security (CNS), pp.\u00a01\u20139. IEEE (2024)","key":"5_CR3","DOI":"10.1109\/CNS62487.2024.10735704"},{"doi-asserted-by":"crossref","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), pp. 509\u2013512 (1999)","key":"5_CR4","DOI":"10.1126\/science.286.5439.509"},{"doi-asserted-by":"crossref","unstructured":"Ba\u015far, T., Olsder, G.J.: Dynamic Noncooperative Game Theory, vol.\u00a023. Siam (1999)","key":"5_CR5","DOI":"10.1137\/1.9781611971132"},{"issue":"3","key":"5_CR6","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0316091","volume":"20","author":"J Chen","year":"2025","unstructured":"Chen, J., Sun, X., Tian, W., Liu, G.: A bayesian game approach for node-based attribution defense against asymmetric information attacks in IoT networks. PLoS ONE 20(3), e0316091 (2025)","journal-title":"PLoS ONE"},{"issue":"1","key":"5_CR7","first-page":"17","volume":"5","author":"P Erd\u0151s","year":"1960","unstructured":"Erd\u0151s, P., R\u00e9nyi, A., et al.: On the evolution of random graphs. Publ. Math. Ins. Hung. Acad. Sci. 5(1), 17\u201360 (1960)","journal-title":"Publ. Math. Ins. Hung. Acad. Sci."},{"doi-asserted-by":"crossref","unstructured":"Fisher, M.L., Nemhauser, G.L., Wolsey, L.A.: An analysis of approximations for maximizing submodular set functions\u2014II. Springer (1978)","key":"5_CR8","DOI":"10.1007\/BFb0121195"},{"key":"5_CR9","first-page":"317","volume":"13","author":"D Gale","year":"1951","unstructured":"Gale, D., Kuhn, H.W., Tucker, A.W.: Linear programming and the theory of games. Act. Anal. Prod. Allocation 13, 317\u2013335 (1951)","journal-title":"Act. Anal. Prod. Allocation"},{"issue":"4","key":"5_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3203245","volume":"51","author":"J Giraldo","year":"2018","unstructured":"Giraldo, J., et al.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. (CSUR) 51(4), 1\u201336 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"unstructured":"Gurobi Optimization, LLC: Gurobi optimizer reference manual (2023). https:\/\/www.gurobi.com","key":"5_CR11"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-01929-6_9","volume-title":"Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems","author":"A Gutfraind","year":"2009","unstructured":"Gutfraind, A., Hagberg, A., Pan, F.: Optimal interdiction of unreactive Markovian evaders. In: van Hoeve, W.-J., Hooker, J.N. (eds.) CPAIOR 2009. LNCS, vol. 5547, pp. 102\u2013116. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01929-6_9"},{"doi-asserted-by":"crossref","unstructured":"Hemida, A., Asghar, A.B., Kamhoua, C., Kleinberg, J.: A game theoretic framework for multi domain cyber deception. In: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 443\u2013447. IEEE (2024)","key":"5_CR13","DOI":"10.1109\/EuroSPW61312.2024.00056"},{"unstructured":"Jain, M., Conitzer, V., Tambe, M.: Security scheduling for real-world networks. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, pp. 215\u2013222 (2013)","key":"5_CR14"},{"unstructured":"Jain, M., Korzhyk, D., Van\u011bk, O., Conitzer, V., P\u011bchou\u010dek, M., Tambe, M.: A double oracle algorithm for zero-sum security games on graphs. In: The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 1, pp. 327\u2013334. Citeseer (2011)","key":"5_CR15"},{"issue":"3","key":"5_CR16","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"5_CR17","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1137\/0112033","volume":"12","author":"CE Lemke","year":"1964","unstructured":"Lemke, C.E., Howson, J.T., Jr.: Equilibrium points of bimatrix games. J. Soc. Ind. Appl. Math. 12(2), 413\u2013423 (1964)","journal-title":"J. Soc. Ind. Appl. Math."},{"unstructured":"Li, Z., Li, S., Zhang, H., Zhou, Y., Xie, S., Zhang, Y.: Overview of sensing attacks on autonomous vehicle technologies and impact on traffic flow. arXiv preprint arXiv:2401.15193 (2024)","key":"5_CR18"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/BF01769190","volume":"7","author":"H Moulin","year":"1978","unstructured":"Moulin, H., Vial, J.P.: Strategically zero-sum games: the class of games whose completely mixed equilibria cannot be improved upon. Internat. J. Game Theory 7, 201\u2013221 (1978)","journal-title":"Internat. J. Game Theory"},{"issue":"1","key":"5_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00095-5","volume":"4","author":"GR M. R.","year":"2021","unstructured":"M. R., G.R., Ahmed, C.M., Mathur, A.: Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation. Cybersecurity 4(1), 1\u201312 (2021). https:\/\/doi.org\/10.1186\/s42400-021-00095-5","journal-title":"Cybersecurity"},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"JF Nash Jr","year":"1950","unstructured":"Nash, J.F., Jr.: Equilibrium points in n-person games. Proc. Natl. Acad. Sci. 36(1), 48\u201349 (1950)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser, G.L., Wolsey, L.A., Fisher, M.L.: An analysis of approximations for maximizing submodular set functions\u2013i. Math. Program. 14, 265\u2013294 (1978)","journal-title":"Math. Program."},{"doi-asserted-by":"crossref","unstructured":"Pi, J., Heyman, J.L., Gupta, A.: Two algorithms for computing exact and approximate Nash equilibria in bimatrix games. In: International Conference on Decision and Game Theory for Security, pp. 17\u201336. Springer (2021)","key":"5_CR23","DOI":"10.1007\/978-3-030-90370-1_2"},{"doi-asserted-by":"crossref","unstructured":"Tong, L., Laszka, A., Yan, C., Zhang, N., Vorobeychik, Y.: Finding needles in a moving haystack: prioritizing alerts with adversarial reinforcement learning. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a034, pp. 946\u2013953 (2020)","key":"5_CR24","DOI":"10.1609\/aaai.v34i01.5442"},{"key":"5_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2023.110999","volume":"152","author":"C Wu","year":"2023","unstructured":"Wu, C., Pan, W., Staa, R., Liu, J., Sun, G., Wu, L.: Deep reinforcement learning control approach to mitigating actuator attacks. Automatica 152, 110999 (2023)","journal-title":"Automatica"},{"issue":"12","key":"5_CR26","doi-asserted-by":"publisher","first-page":"3815","DOI":"10.3390\/s24123815","volume":"24","author":"W Xing","year":"2024","unstructured":"Xing, W., Shen, J.: Security control of cyber-physical systems under cyber attacks: a survey. Sensors 24(12), 3815 (2024)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., Han, X., Deng, G., Li, J., Liu, Y., Zhang, T.: Sok: rethinking sensor spoofing attacks against robotic vehicles from a systematic view. In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS &P), pp. 1082\u20131100. IEEE (2023)","key":"5_CR27","DOI":"10.1109\/EuroSP57164.2023.00067"},{"unstructured":"Yang, Y.T., Zhu, Q.: Game-theoretic foundations for cyber resilience against deceptive information attacks in intelligent transportation systems. arXiv preprint arXiv:2412.04627 (2024)","key":"5_CR28"}],"container-title":["Lecture Notes in Computer Science","Game Theory and AI for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08067-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:02:46Z","timestamp":1760302966000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08067-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032080660","9783032080677"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08067-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Game Theory and AI for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}