{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:36:53Z","timestamp":1759991813271},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474120"},{"type":"electronic","value":"9783319474137"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47413-7_22","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T20:20:15Z","timestamp":1475612415000},"page":"382-394","source":"Crossref","is-referenced-by-count":14,"title":["A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars"],"prefix":"10.1007","author":[{"given":"Amin","family":"Mohammadi","sequence":"first","affiliation":[]},{"given":"Mohammad Hossein","family":"Manshaei","sequence":"additional","affiliation":[]},{"given":"Monireh Mohebbi","family":"Moghaddam","sequence":"additional","affiliation":[]},{"given":"Quanyan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Virvilis, N., Serrano, O.S., Vanautgaerden, B.: Changing the game: the art of deceiving sophisticated attackers. In: 6th International Conference On Cyber Conflict (CyCon 2014), pp. 87\u201397. IEEE (2014)","DOI":"10.1109\/CYCON.2014.6916397"},{"issue":"6","key":"22_CR2","doi-asserted-by":"crossref","first-page":"2404","DOI":"10.1016\/j.camwa.2011.07.027","volume":"62","author":"S Shen","year":"2011","unstructured":"Shen, S., Li, Y., Xu, H., Cao, Q.: Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math. Appl. 62(6), 2404\u20132416 (2011)","journal-title":"Comput. Math. Appl."},{"issue":"2","key":"22_CR3","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s10845-012-0683-0","volume":"25","author":"A Ahmad","year":"2014","unstructured":"Ahmad, A., Maynard, S.B., Park, S.: Information security strategies: towards an organizational multi-strategy perspective. J. Intell. Manuf. 25(2), 357\u2013370 (2014)","journal-title":"J. Intell. Manuf."},{"issue":"10","key":"22_CR4","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1002\/sec.242","volume":"4","author":"TE Carroll","year":"2011","unstructured":"Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. Secur. Commun. Netw. 4(10), 1162\u20131172 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 workshop on New Security Paradigms Workshop, pp. 127\u2013138. ACM (2014)","DOI":"10.1145\/2683467.2683482"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Zarras, A.: The art of false alarms in the game of deception: leveraging fake honeypots for enhanced security. In: 2014 International Carnahan Conference onSecurity Technology (ICCST), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/CCST.2014.6987017"},{"issue":"2","key":"22_CR7","doi-asserted-by":"crossref","first-page":"175","DOI":"10.13052\/jcsm2245-1439.224","volume":"2","author":"W Wang","year":"2013","unstructured":"Wang, W., Bickford, J., Murynets, I., Subbaraman, R., Forte, A.G., Singaraju, G., et al.: Detecting targeted attacks by multilayer deception. J. Cyber Secur. Mob. 2(2), 175\u2013199 (2013)","journal-title":"J. Cyber Secur. Mob."},{"key":"22_CR8","volume-title":"Hardening Honeynets against Honeypot-aware Botnet Attacks","author":"C Costarella","year":"2013","unstructured":"Costarella, C., Chung, S., Endicott-Popovsky, B., Dittrich, D.: Hardening Honeynets against Honeypot-aware Botnet Attacks. University of Washington, US (2013)"},{"key":"22_CR9","unstructured":"Zhu, Q., Clark, A., Poovendran, R., Basar, T.: Deployment and exploitation of deceptive honeybots in social networks. In: Conference on Decision and Control. IEEE (2013)"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-34266-0_10","volume-title":"Decision and Game Theory for Security","author":"A Clark","year":"2012","unstructured":"Clark, A., Zhu, Q., Poovendran, R., Ba\u015far, T.: Deceptive routing in relay networks. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 171\u2013185. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34266-0_10"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Clark, A., Poovendran, R., Basar, T.: Deceptive routing games. In: IEEE 51st Conference on Decision and Control (CDC), pp. 2704\u20132711. IEEE (2012)","DOI":"10.1109\/CDC.2012.6426515"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"L\u2019Huillier, G., Weber, R., Figueroa, N.: Online phishing classification using adversarial data mining and signaling games. In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, pp. 33\u201342. ACM (2009)","DOI":"10.1145\/1599272.1599279"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Ibrahimi, K., Altman, E., Haddad, M.: Signaling game-based approach to power control management in wireless networks. In: Proceedings of Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 139\u2013144. ACM (2013)","DOI":"10.1145\/2512840.2512859"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-04483-5_4","volume-title":"Distributed Computing and Internet Technology","author":"W Casey","year":"2014","unstructured":"Casey, W., Morales, J.A., Nguyen, T., Spring, J., Weaver, R., Wright, E., Metcalf, L., Mishra, B.: Cyber security via signaling games: toward a science of cyber security. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 34\u201342. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-04483-5_4"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., Manshaei, M.H., Al-Shaer, E.: A game-theoretic approach for deceiving remote operating system fingerprinting. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 73\u201381. IEEE (2013)","DOI":"10.1109\/CNS.2013.6682694"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-319-25594-1_16","volume-title":"Decision and Game Theory for Security","author":"J Pawlick","year":"2015","unstructured":"Pawlick, J., Farhang, S., Zhu, Q.: Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 289\u2013308. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25594-1_16"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-319-25594-1_18","volume-title":"Decision and Game Theory for Security","author":"M Mohebbi Moghaddam","year":"2015","unstructured":"Mohebbi Moghaddam, M., Manshaei, M.H., Zhu, Q.: To trust or not: a security signaling game between service provider and client. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 322\u2013333. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25594-1_18"},{"key":"22_CR18","unstructured":"Pawlick, J., Zhu, Q.: Deception by design: evidence-based signaling games for network defense. arXiv preprint arXiv:1503.05458 (2015)"},{"issue":"2","key":"22_CR19","first-page":"131","volume":"2","author":"A Patcha","year":"2006","unstructured":"Patcha, A., Park, J.M.: A game theoretic formulation for intrusion detection in mobile ad hoc networks. IJ Netw. Secur. 2(2), 131\u2013137 (2006)","journal-title":"IJ Netw. Secur."},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Estiri, M., Khademzadeh, A.: A theoretical signaling game model for intrusion detection in wireless sensor networks. In: 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS), pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/NETWKS.2010.5624961"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Y., Comaniciu, C., Man, H.: A bayesian game approach for intrusion detection in wireless ad hoc networks. In: Workshop on Game theory for communications and networks. ACM (2006)","DOI":"10.1145\/1190195.1190198"},{"key":"22_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-34266-0_7","volume-title":"Decision and Game Theory for Security","author":"J Lin","year":"2012","unstructured":"Lin, J., Liu, P., Jing, J.: Using signaling games to model the multi-step attack-defense scenarios on confidentiality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 118\u2013137. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34266-0_7"},{"key":"22_CR23","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511811654","volume-title":"Multiagent Systems: Algorithmic, Game-theoretic, and Logical Foundations","author":"Y Shoham","year":"2008","unstructured":"Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2008)"},{"key":"22_CR24","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvcmxrzd","volume-title":"Game Theory for Applied Economists","author":"R Gibbons","year":"1992","unstructured":"Gibbons, R.: Game Theory for Applied Economists. Princeton University Press, Princeton (1992)"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47413-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T07:56:52Z","timestamp":1568447812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47413-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319474120","9783319474137"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47413-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}