{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T02:07:31Z","timestamp":1747274851343,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319259147"},{"type":"electronic","value":"9783319259154"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25915-4_11","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T09:43:45Z","timestamp":1451382225000},"page":"191-211","source":"Crossref","is-referenced-by-count":1,"title":["Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Shakarian","sequence":"first","affiliation":[]},{"given":"Nimish","family":"Kulkarni","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Abbasi, F., Harris, R., Moretti, G., Haider, A., Anwar, N.: Classification of malicious network streams using honeynets. In: Global Communications Conference (GLOBECOM), pp. 891\u2013897 (2012)","key":"11_CR1","DOI":"10.1109\/GLOCOM.2012.6503226"},{"key":"11_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511760778","volume-title":"Network Security: A Decision and Game-Theoretic Approach","author":"T Alpcan","year":"2010","unstructured":"Alpcan, T., Baar, T.: Network Security: A Decision and Game-Theoretic Approach, 1st edn. Cambridge University Press, New York (2010)","edition":"1"},{"issue":"7","key":"11_CR3","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1002\/sec.619","volume":"6","author":"CM Chen","year":"2013","unstructured":"Chen, C.M., Cheng, S.T., Zeng, R.Y.: A proactive approach to intrusion detection and malware collection. Secur. Commun. Netw. 6(7), 844\u2013853 (2013). http:\/\/dx.doi.org\/10.1002\/sec.619","journal-title":"Secur. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1029\u20131038 (2010)","key":"11_CR4","DOI":"10.1145\/1835804.1835934"},{"key":"11_CR5","series-title":"Effectiveness of Moving Target Defenses","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-1-4614-0977-9_2","volume-title":"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Chap.","author":"D Evans","year":"2011","unstructured":"Evans, D., Nguyen-Tuong, A., Knight, J.C.: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Chap. Effectiveness of Moving Target Defenses, p. 29. Springer, New York (2011)"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1145\/285055.285059","volume":"45","author":"U Feige","year":"1998","unstructured":"Feige, U.: A threshold of ln n for approximating set cover. J. ACM 45(4), 634\u2013652 (1998)","journal-title":"J. ACM"},{"key":"11_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0121195","volume-title":"An Analysis of Approximations for Maximizing Submodular Set Functions\u2013II","author":"ML Fisher","year":"1978","unstructured":"Fisher, M.L., Nemhauser, G.L., Wolsey, L.A.: An Analysis of Approximations for Maximizing Submodular Set Functions\u2013II. Springer, Heidelberg (1978)"},{"key":"11_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8","volume-title":"Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Advances in Information Security","author":"S Jajodia","year":"2013","unstructured":"Jajodia, S., Ghosh, A.K., Subrahmanian, V.S., Swarup, V., Wang, C., Wang, X.S.: Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Advances in Information Security, vol. 100, 1st edn. Springer, New York (2013)","edition":"1"},{"volume-title":"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security","year":"2011","unstructured":"Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.): Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Advances in Information Security, vol. 54. Springer, New York (2011)","key":"11_CR9"},{"issue":"3","key":"11_CR10","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TSE.2010.60","volume":"37","author":"PK Manadhata","year":"2011","unstructured":"Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371\u2013386 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"crossref","unstructured":"Mirzasoleiman, B., Badanidiyuru, A., Karbasi, A., Vondr\u00e1k, J., Krause, A.: Lazier than lazy greedy. In: AAAI, pp. 1812\u20131818 (2015)","key":"11_CR11","DOI":"10.1609\/aaai.v29i1.9486"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-34266-0_12","volume-title":"Decision and Game Theory for Security","author":"R P\u00edbil","year":"2012","unstructured":"P\u00edbil, R., Lis\u00fd, V., Kiekintveld, C., Bo\u0161ansk\u00fd, B., P\u011bchou\u010dek, M.: Game theoretic model of strategic honeypot selection in computer networks. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 201\u2013220. Springer, Heidelberg (2012)"},{"key":"11_CR13","volume-title":"Introduction to Cyber-Warfare: A Multidisciplinary Approach","author":"P Shakarian","year":"2013","unstructured":"Shakarian, P., Shakarian, J., Ruef, A.: Introduction to Cyber-Warfare: A Multidisciplinary Approach. Elsevier\/Syngress, New York (2013)"},{"doi-asserted-by":"crossref","unstructured":"Sweeney, P., Cybenko, G.: An analytic approach to cyber adversarial dynamics. In: SPIE Defense, Security, and Sensing, pp. 835906\u2013835906. International Society for Optics and Photonics (2012)","key":"11_CR14","DOI":"10.1117\/12.924758"},{"unstructured":"Williamson, S.A., Varakantham, P., Hui, O.C., Gao, D.: Active malware analysis using stochastic games. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2012, vol. 1, pp. 29\u201336. International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC (2012). http:\/\/dl.acm.org\/citation.cfm?id=2343576.2343580","key":"11_CR15"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25915-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T09:16:07Z","timestamp":1692177367000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25915-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319259147","9783319259154"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25915-4_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}