{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:31:03Z","timestamp":1742963463222,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319448312"},{"type":"electronic","value":"9783319448329"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44832-9_15","type":"book-chapter","created":{"date-parts":[[2016,8,9]],"date-time":"2016-08-09T10:24:12Z","timestamp":1470738252000},"page":"247-260","source":"Crossref","is-referenced-by-count":6,"title":["Revenue Maximizing Markets for Zero-Day Exploits"],"prefix":"10.1007","author":[{"given":"Mingyu","family":"Guo","sequence":"first","affiliation":[]},{"given":"Hideaki","family":"Hata","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Babar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,10]]},"reference":[{"issue":"3","key":"15_CR1","first-page":"71","volume":"8","author":"AM Algarni","year":"2014","unstructured":"Algarni, A.M., Malaiya, Y.K.: Software vulnerability markets: discoverers and buyers. Int. J. Comput. Electr. Autom. Control Inf. Eng. 8(3), 71\u201381 (2014)","journal-title":"Int. J. Comput. Electr. Autom. Control Inf. Eng."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Bilge, L., Dumitras, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 833\u2013844. ACM, New York (2012). http:\/\/doi.acm.org\/10.1145\/2382196.2382284","DOI":"10.1145\/2382196.2382284"},{"key":"15_CR3","unstructured":"Brams, S.J., Jones, M.A., Klamler, C.: Better ways to cut a cake - revisited. In: Brams, S., Pruhs, K., Woeginger, G. (eds.) Fair Division. No. 07261 in Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum f\u00fcr Informatik (IBFI), Schloss Dagstuhl, Germany, Dagstuhl, Germany (2007)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Y., Lai, J., Parkes, D., Procaccia, A.: Truth, justice, and cake cutting. In: Proceedings of the National Conference on Artificial Intelligence (AAAI), Atlanta, GA, USA (2010)","DOI":"10.1609\/aaai.v24i1.7621"},{"key":"15_CR5","unstructured":"Egelman, S., Herley, C., van Oorschot, P.C.: Markets for zero-day exploits: ethics and implications. In: Proceedings of 2013 Workshop on New Security Paradigms Workshop, NSPW 2013, pp. 41\u201346. ACM, NewYork (2013). http:\/\/doi.acm.org\/10.1145\/2535813.2535818"},{"key":"15_CR6","unstructured":"Fisher, D.: Vupen founder launches new zero-day acquisition firm zerodium, 24 July 2015. https:\/\/threatpost.com\/vupen-launches-new-zero-day-acquisition-firm-zerodium\/113933\/"},{"key":"15_CR7","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/S0196-6774(03)00098-1","volume":"50","author":"M Goemans","year":"2004","unstructured":"Goemans, M., Skutella, M.: Cooperative facility location games. J. Algorithms 50, 194\u2013214 (2004). Early version: SODA 2000, 76\u201385","journal-title":"J. Algorithms"},{"key":"15_CR8","unstructured":"Greenberg, A.: Shopping for zero-days: a price list for hackers\u2019 secret software exploits, 23 March 2012. http:\/\/www.forbes.com\/sites\/andygreenberg\/2012\/03\/23\/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits\/"},{"key":"15_CR9","unstructured":"Guo, M., Conitzer, V.: Computationally feasible automated mechanism design: general approach and case studies. In: Proceedings of the National Conference on Artificial Intelligence (AAAI), Atlanta, GA, USA, pp. 1676\u20131679 (2010). Nectar Track"},{"key":"15_CR10","unstructured":"Likhodedov, A., Sandholm, T.: Methods for boosting revenue in combinatorial auctions. In: Proceedings of the National Conference on Artificial Intelligence (AAAI), San Jose, CA, USA, pp. 232\u2013237 (2004)"},{"key":"15_CR11","unstructured":"Likhodedov, A., Sandholm, T.: Approximating revenue-maximizing combinatorial auctions. In: Proceedings of the National Conference on Artificial Intelligence (AAAI), Pittsburgh, PA, USA (2005)"},{"key":"15_CR12","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1287\/moor.6.1.58","volume":"6","author":"R Myerson","year":"1981","unstructured":"Myerson, R.: Optimal auction design. Math. Oper. Res. 6, 58\u201373 (1981)","journal-title":"Math. Oper. Res."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Procaccia, A.D., Tennenholtz, M.: Approximate mechanism design without money. In: Proceedings of the ACM Conference on Electronic Commerce (EC), Stanford, CA, USA, pp. 177\u2013186 (2009)","DOI":"10.1145\/1566374.1566401"},{"key":"15_CR14","unstructured":"Projects, T.C.: Severity guidelines for security issues (2015). https:\/\/www.chromium.org\/developers\/severity-guidelines . Accessed 15 Sept 2015"}],"container-title":["Lecture Notes in Computer Science","PRIMA 2016: Princiles and Practice of Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44832-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T15:46:01Z","timestamp":1692459961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44832-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319448312","9783319448329"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44832-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}