{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:29:20Z","timestamp":1725870560683},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319387871"},{"type":"electronic","value":"9783319387895"}],"license":[{"start":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T00:00:00Z","timestamp":1478649600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-38789-5_68","type":"book-chapter","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T10:54:56Z","timestamp":1478602496000},"page":"611-621","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity Decision Making Mechanism for Defense Strategies in Vehicle Networks"],"prefix":"10.1007","author":[{"given":"Wei","family":"Pan","sequence":"first","affiliation":[]},{"given":"Mengzi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Haobin","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,9]]},"reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Nguyen KC, Alpcan T, Ba\u015far T (2009) Stochastic games for security in networks with interdependent nodes. In: Proceedings of the 2009 international conference on game theory for networks, gamenets \u201909, pp 697\u2013703","DOI":"10.1109\/GAMENETS.2009.5137463"},{"key":"68_CR2","doi-asserted-by":"crossref","unstructured":"Manshaei MH, Zhu Q, Alpcan T, Ba\u015far T, Hubaux J-P (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3):1\u201339","DOI":"10.1145\/2480741.2480742"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Ten C-W, Liu C-C, Manimaran G (2008) Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans Power Syst 23(4):1836\u20131846","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"68_CR4","doi-asserted-by":"crossref","unstructured":"Manuel C, Alfredo P, Riccardo S (2011) Formal vulnerability analysis of a security system for remote fieldbus access. IEEE Trans Ind Inf 7(1):30\u201340","DOI":"10.1109\/TII.2010.2099233"},{"key":"68_CR5","doi-asserted-by":"crossref","unstructured":"Almasizadeh J, Azgomi MA (2013) A stochastic model of attack process for the evaluation of security metrics. Comput Netw 57(10):2159\u20132180","DOI":"10.1016\/j.comnet.2013.03.011"},{"key":"68_CR6","doi-asserted-by":"crossref","unstructured":"Zhu Q, Ba\u015far T (2011) Robust and resilient control design for cyber-physical systems with an application to power systems. In: 50th IEEE conference on decision and control and European control conference (CDC-ECC), pp 4066\u20134071","DOI":"10.1109\/CDC.2011.6161031"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Zhu Q, Basar T (2012) A hierarchical security architecture for smart grid. Smart Grid Commun Netw, pp 413\u2013440","DOI":"10.1017\/CBO9781139013468.019"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"Zonouz S, Haghani P (2013) Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators\u2019 responsive behavior. Comput Secur 39:190\u2013200","DOI":"10.1016\/j.cose.2013.07.003"},{"key":"68_CR9","unstructured":"Prabhakar M, Singh JN, Mahadevan G (2012) Nash equilibrium and Marcov chains to enhance game theoretic approach for vanet security. In: Proceedings of international conference on advances in computing, pp 191\u2013199"}],"container-title":["Advances in Intelligent Systems and Computing","Information Technology and Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-38789-5_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:03:53Z","timestamp":1498359833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-38789-5_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,9]]},"ISBN":["9783319387871","9783319387895"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-38789-5_68","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,11,9]]}}}