{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T08:33:12Z","timestamp":1770021192269,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319255934","type":"print"},{"value":"9783319255941","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25594-1_16","type":"book-chapter","created":{"date-parts":[[2015,11,11]],"date-time":"2015-11-11T02:03:13Z","timestamp":1447207393000},"page":"289-308","source":"Crossref","is-referenced-by-count":63,"title":["Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats"],"prefix":"10.1007","author":[{"given":"Jeffrey","family":"Pawlick","sequence":"first","affiliation":[]},{"given":"Sadegh","family":"Farhang","sequence":"additional","affiliation":[]},{"given":"Quanyan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"16_CR1","unstructured":"Delphi drive, Delphi Automotive. \n                      http:\/\/www.delphi.com\/delphi-drive"},{"key":"16_CR2","unstructured":"Gestalt, Mirium-Webster. \n                      http:\/\/www.merriam-webster.com\/dictionary\/gestalt"},{"key":"16_CR3","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvcm4gdk","volume-title":"Feedback Systems: An Introduction for Scientists and Engineers","author":"KJ Astr\u00f6m","year":"2010","unstructured":"Astr\u00f6m, K.J., Murray, R.M.: Feedback Systems: An Introduction for Scientists and Engineers. Princeton University Press, Princeton (2010)"},{"key":"16_CR4","unstructured":"Baheti, R., Gill, H.: Cyber-physical systems. In: The Impact of Control Technology, vol. 12, pp. 161\u2013166 (2011)"},{"issue":"1","key":"16_CR5","first-page":"60","volume":"2","author":"S Bhardwaj","year":"2010","unstructured":"Bhardwaj, S., Jain, L., Jain, S.: Cloud computing: A study of infrastructure as a service (IAAS). Int. J. Eng. Inf. Technol. 2(1), 60\u201363 (2010)","journal-title":"Int. J. Eng. Inf. Technol."},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-34266-0_15","volume-title":"Decision and Game Theory for Security","author":"KD Bowers","year":"2012","unstructured":"Bowers, K.D., van Dijk, M., Griffin, R., Juels, A., Oprea, A., Rivest, R.L., Triandopoulos, N.: Defending against the unknown enemy: applying FlipIt to system security. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 248\u2013263. Springer, Heidelberg (2012)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. In: Security and Communication, Networks vol. 4(10), pp. 1162\u20131172 (2011)","DOI":"10.1002\/sec.242"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-04483-5_4","volume-title":"Distributed Computing and Internet Technology","author":"W Casey","year":"2014","unstructured":"Casey, W., Morales, J.A., Nguyen, T., Spring, J., Weaver, R., Wright, E., Metcalf, L., Mishra, B.: Cyber security via signaling games: toward a science of cyber security. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 34\u201342. Springer, Heidelberg (2014)"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-319-12601-2_18","volume-title":"Decision and Game Theory for Security","author":"S Farhang","year":"2014","unstructured":"Farhang, S., Manshaei, M.H., Esfahani, M.N., Zhu, Q.: A dynamic bayesian security game framework for strategic defense mechanism design. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 319\u2013328. Springer, Heidelberg (2014)"},{"key":"16_CR10","volume-title":"Game Theory","author":"D Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Game Theory, vol. 393. MIT press, Cambridge (1991)"},{"key":"16_CR11","unstructured":"Guizzo, E.: How googles self-driving car works. IEEE Spectrum Online, 18 October"},{"issue":"2","key":"16_CR12","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1109\/TASE.2014.2376492","volume":"12","author":"B Kehoe","year":"2015","unstructured":"Kehoe, B., Patil, S., Abbeel, P., Goldberg, K.: A survey of research on cloud robotics and automation. IEEE Trans. Autom. Sci. Eng. 12(2), 398\u2013409 (2015)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Lee, E.A.: Cyber physical systems: design challenges. In: 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363\u2013369. IEEE (2008)","DOI":"10.1109\/ISORC.2008.25"},{"issue":"1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"JF Nash","year":"1950","unstructured":"Nash, J.F., et al.: Equilibrium points in n-person games. Proc. Nat. Acad. Sci. USA 36(1), 48\u201349 (1950)","journal-title":"Proc. Nat. Acad. Sci. USA"},{"key":"16_CR15","unstructured":"Pawlick, J., Zhu, Q.: Deception by design: Evidence-based signaling games for network defense. arXiv preprint \n                      arXiv:1503.05458\n                      \n                     (2015)"},{"issue":"4","key":"16_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1218063.1217938","volume":"40","author":"G Portokalidis","year":"2006","unstructured":"Portokalidis, G., Slowinska, A., Bos, H.: Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. ACM SIGOPS Operating Syst. Rev. 40(4), 15\u201327 (2006)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"key":"16_CR17","unstructured":"Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: Caravan: Providing location privacy for vanet. Technical report, DTIC Document (2005)"},{"issue":"8","key":"16_CR18","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1109\/JSAC.2007.071007","volume":"25","author":"K Sampigethaya","year":"2007","unstructured":"Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: Robust location privacy scheme for vanet. IEEE J. Sel. Areas Commun. 25(8), 1569\u20131589 (2007)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"8","key":"16_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","volume":"2011","author":"C Tankard","year":"2011","unstructured":"Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16\u201319 (2011)","journal-title":"Netw. Secur."},{"issue":"4","key":"16_CR20","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s00145-012-9134-5","volume":"26","author":"M Dijk van","year":"2013","unstructured":"van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: Flipit: The game of \u201cstealthy takeover\u201d. J. Cryptol. 26(4), 655\u2013713 (2013)","journal-title":"J. Cryptol."},{"issue":"2","key":"16_CR21","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ejor.2009.07.028","volume":"203","author":"J Zhuang","year":"2010","unstructured":"Zhuang, J., Bier, V.M., Alagoz, O.: Modeling secrecy and deception in a multiple-period attacker-defender signaling game. Eur. J. Oper. Res. 203(2), 409\u2013418 (2010)","journal-title":"Eur. J. Oper. Res."}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25594-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T13:57:42Z","timestamp":1559311062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25594-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255934","9783319255941"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25594-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}