{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T10:19:53Z","timestamp":1769941193017,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319255934","type":"print"},{"value":"9783319255941","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25594-1_6","type":"book-chapter","created":{"date-parts":[[2015,11,11]],"date-time":"2015-11-11T02:03:13Z","timestamp":1447207393000},"page":"93-112","source":"Crossref","is-referenced-by-count":34,"title":["A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources"],"prefix":"10.1007","author":[{"given":"Ming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zizhan","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ness B.","family":"Shroff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"6_CR1","unstructured":"Advanced persistent threat. \n                      http:\/\/en.wikipedia.org\/wiki\/Advanced_persistent_threat"},{"key":"6_CR2","unstructured":"ESET and Sucuri Uncover Linux\/Cdorked.A: The Most Sophisticated Apache Backdoor (2013). \n                      http:\/\/www.eset.com\/int\/about\/press\/articles\/article\/eset-and-sucuri-uncover-linuxcdorkeda-apache-webserver-backdoor-the-most-sophisticated-ever-affecting-thousands-of-web-sites\/"},{"key":"6_CR3","unstructured":"Coviello, A.: Open letter to RSA customers, 17 March 2011. \n                      http:\/\/www.rsa.com\/node.aspx?id=3872"},{"key":"6_CR4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511760778","volume-title":"Network Security: A Decision and Game-Theoretic Approach","author":"T Alpcan","year":"2010","unstructured":"Alpcan, T., Ba\u015far, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press, Cambridge (2010)"},{"key":"6_CR5","unstructured":"Anderson, R.: Why information security is hard - an economic perspective. In: Proceedings of ACSAC (2001)"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3390\/fi4040971","volume":"4","author":"B Bencs\u00e1th","year":"2012","unstructured":"Bencs\u00e1th, B., P\u00e9k, G., Butty\u00e1n, L., F\u00e9legyh\u00e1zi, M.: The cousins of stuxnet: duqu, flame, and gauss. Future Internet 4, 971\u20131003 (2012)","journal-title":"Future Internet"},{"key":"6_CR7","unstructured":"Bowers, K.D., Dijk, M.E.V., Juels, A., Oprea, A.M., Rivest, R.L., Triandopoulos, N.: Graph-based approach to deterring persistent security threats. US Patent 8813234 (2014)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-34266-0_15","volume-title":"Decision and Game Theory for Security","author":"KD Bowers","year":"2012","unstructured":"Bowers, K.D., van Dijk, M., Griffin, R., Juels, A., Oprea, A., Rivest, R.L., Triandopoulos, N.: Defending against the unknown enemy: applying flipIt to system security. In: Walrand, J., Grossklags, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 248\u2013263. Springer, Heidelberg (2012)"},{"key":"6_CR9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815102","volume-title":"Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing","author":"L Buttyan","year":"2007","unstructured":"Buttyan, L., Hubaux, J.-P.: Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. Cambridge University Press, New York (2007)"},{"key":"6_CR10","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-642-35582-0_20","volume-title":"Game Theory for Networks","author":"A Gueye","year":"2012","unstructured":"Gueye, A., Marbukh, V., Walrand, J.C.: Towards a metric for communication network vulnerability to attacks: a game theoretic approach. In: Krishnamurthy, V., Zhao, Q., Huang, M., Wen, Y. (eds.) GameNets 2012. LNICST, vol. 105, pp. 259\u2013274. Springer, Heidelberg (2012)"},{"key":"6_CR11","unstructured":"Kearns, M., Ortiz, L.E.: Algorithms for interdependent security games. In: Proceedings of NIPS (2003)"},{"key":"6_CR12","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1613\/jair.3269","volume":"41","author":"D Korzhyk","year":"2011","unstructured":"Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. Nash in security games: an extended investigation of interchangeability, equivalence, and uniqueness. J. Artif. Intell. Res. 41, 297\u2013327 (2011)","journal-title":"J. Artif. Intell. Res."},{"issue":"2\u20133","key":"6_CR13","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H Kunreuther","year":"2003","unstructured":"Kunreuther, H., Heal, G.: Interdependent security. J. Risk Uncertainty 26(2\u20133), 231\u2013249 (2003)","journal-title":"J. Risk Uncertainty"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/978-3-319-12601-2_10","volume-title":"Decision and Game Theory for Security","author":"A Laszka","year":"2014","unstructured":"Laszka, A., Horvath, G., Felegyhazi, M., Butty\u00e1n, L.: Flipthem: modeling targeted attacks with flipit for multiple. In: Saad, W., Poovendran, R. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 175\u2013194. Springer, Heidelberg (2014)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-45046-4_26","volume-title":"Web and Internet Economics","author":"A Laszka","year":"2013","unstructured":"Laszka, A., Johnson, B., Grossklags, J.: Mitigating covert compromises: a game-theoretic model of targeted and non-targeted covert attacks. In: Chen, Y., Immorlica, N. (eds.) WINE 2013. LNCS, vol. 8289, pp. 319\u2013332. Springer, Heidelberg (2013)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Ba\u015far, T.: Game theory meets network security and privacy. ACM Comput. Surv. (2012)","DOI":"10.1145\/2480741.2480742"},{"key":"6_CR17","unstructured":"Moore, T., Anderson, R.: Economics and internet security: a survey of recent analytical, empirical and behavioral research (2011). \n                      ftp:\/\/ftp.deas.harvard.edu\/techreports\/tr-03-11.pdf"},{"key":"6_CR18","volume-title":"A Course in Game Theory","author":"MJ Osborne","year":"1994","unstructured":"Osborne, M.J., Rubinstein, A.: A Course in Game Theory. The MIT Press, Cambridge (1994)"},{"key":"6_CR19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031","volume-title":"Security and Game Theory: Algorithms, Deployed Systems","author":"M Tambe","year":"2011","unstructured":"Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems. Cambridge University Press, New York (2011)"},{"issue":"4","key":"6_CR20","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s00145-012-9134-5","volume":"26","author":"M Dijk van","year":"2013","unstructured":"van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: the game of \u201cStealthy Takeover\". J. Cryptology 26(4), 655\u2013713 (2013)","journal-title":"J. Cryptology"},{"key":"6_CR21","unstructured":"Zhang, M., Zheng, Z., Shroff, N.B.: A game theoretic model for defending against stealthy attacks with limited resources. Tehnical Report. \n                      http:\/\/arxiv.org\/abs\/1508.01950"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25594-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T14:16:42Z","timestamp":1559312202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25594-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255934","9783319255941"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25594-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}