{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:41:50Z","timestamp":1743075710920,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319086231"},{"type":"electronic","value":"9783319086248"}],"license":[{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-08624-8_10","type":"book-chapter","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T13:40:10Z","timestamp":1409751610000},"page":"219-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Game Theoretic Engine for Cyber Warfare"],"prefix":"10.1007","author":[{"given":"Allen","family":"Ott","sequence":"first","affiliation":[]},{"given":"Alex","family":"Moir","sequence":"additional","affiliation":[]},{"given":"John T.","family":"Rickard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,4]]},"reference":[{"key":"10_CR1","unstructured":"Katz, A., Butler, B.: \u201cGame Commander\u201d-Applying an architecture of game theory and tree look ahead to the command and control process. In: Proceedings of the Fifth Annual Conference on AI, Simulation, and Planning (AIS94). Florida (1994)"},{"issue":"3","key":"10_CR2","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1147\/rd.33.0210","volume":"3","author":"AL Samuel","year":"1959","unstructured":"Samuel, A.L.: Some studies in machine learning using the game of checkers. IBM J. Res. Dev. 3(3), 211\u2013229 (1959)","journal-title":"IBM J. Res. Dev."},{"issue":"2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1162\/neco.1994.6.2.215","volume":"6","author":"G Tesauro","year":"1994","unstructured":"Tesauro, G.: TD-Gammon, a Self-Teaching Backgammon Program, reaches master-level play. Neural Comput. 6(2), 215\u2013219 (1994)","journal-title":"Neural Comput."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Hsu, F., et al.: Deep thought. In: Marsland, T.A., Schaeffer, J. (eds.) Computer, Chess, and Cognition, pp. 55\u201378. Springer, New York (1990)","DOI":"10.1007\/978-1-4613-9080-0_5"},{"key":"10_CR5","unstructured":"Hamilton, S.N., Hamilton, W.L.: Adversary modeling and simulation in cyber warfare. International Information Security Conference (2008)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Dudebout, N., Shamma, J.S.: Empirical evidence equilibria in stochastic games. In: 51st IEEE Conference on Deicsion and Control, December 2012 (2012)","DOI":"10.1109\/CDC.2012.6426118"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Gopalakrishnan, R., Marden, J.R., Wierman, A.: An architectural view of game theoretic control. ACM SIGMETRICS Perform. Eval. Rev. 38(3), 31\u201336 (2011)","DOI":"10.1145\/1925019.1925026"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Marden, J.R., Arslan, G., Shamma, J.S.: Connections between cooperative control and potential games. IEEE Trans. Syst. Man Cybern. Part B Cybern. 39, 1393\u20131407 (2009)","DOI":"10.1109\/TSMCB.2009.2017273"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1109\/TNET.2010.2041066","volume":"18","author":"L Chen","year":"2010","unstructured":"Chen, L., Low, S.H., Doyle, J.C.: Random access game and medium access control design. IEEE\/ACM Trans. Networking 18(4), 1303\u20131316 (2010)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"472","DOI":"10.3166\/ejc.17.472-482","volume":"5\u20136","author":"F Chandra","year":"2011","unstructured":"Chandra, F., Gayme, D.F., Chen, L., Doyle, J.C.: Robustness, optimization, and architectures. Eur. J. Control 5\u20136, 472\u2013482 (2011)","journal-title":"Eur. J. Control"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Chen, L., Li, N., Jiang, L., Low, S.H.: Optimal demand response: problem formulation and deterministic case. In: Chakrabortty, A., Ilic, M. (eds.) Control and Optimization Theory for Electric Smart Grids. Springer, New York (2012)","DOI":"10.1007\/978-1-4614-1605-0_3"},{"key":"10_CR12","unstructured":"Carmel, D., Markovitch, S.: Learning and using opponent models in adversary search. Technical report CIS9606 (1996)"},{"key":"10_CR13","unstructured":"Meyers, K., Saydjari, O.S., et al.: ARDA cyber strategy and tactics workshop final report (2002)"},{"key":"10_CR14","unstructured":"Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: The role of game theory in information warfare. The information survivability workshop (2001)"},{"key":"10_CR15","unstructured":"Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: Challenges in applying game theory to the domain of information warfare. The information survivability workshop (2001)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Rickard, J.T., Aisbett, J.: New classes of threshold aggregation functions based upon the Tsallis q-exponential with applications to perceptual computing. Accepted for publication in IEEE Trans. Fuzzy Syst. (2013)","DOI":"10.1109\/IFSA-NAFIPS.2013.6608540"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Rickard, J.T., Aisbett, J., Yager, R.R., Gibbon, G.: Linguistic weighted power means: comparison with the linguistic weighted average. In: Proceedings of FUZZ-IEEE 2011, 2011 World Congress on Computational Intelligence, June 2011, pp. 2185\u20132192. Taipei, Taiwan (2011)","DOI":"10.1109\/FUZZY.2011.6007346"},{"key":"10_CR18","unstructured":"Rickard, J.T., Aisbett, J., Yager, R.R., Gibbon, G.: Fuzzy weighted power means in evaluation decisions. In: Proceedings of World Symposium on Soft Computing, Paper #100, May 2011. San Francisco, CA (2011)"}],"container-title":["Studies in Computational Intelligence","Intelligent Methods for Cyber Warfare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08624-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T10:11:52Z","timestamp":1676887912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08624-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,4]]},"ISBN":["9783319086231","9783319086248"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08624-8_10","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,9,4]]},"assertion":[{"value":"4 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}