{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:33:58Z","timestamp":1725867238242},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474120"},{"type":"electronic","value":"9783319474137"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47413-7_23","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T20:20:15Z","timestamp":1475612415000},"page":"397-414","source":"Crossref","is-referenced-by-count":1,"title":["Network Elicitation in Adversarial Environment"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Dziubi\u0144ski","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Sankowski","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","DOI":"10.3386\/w19174","volume-title":"Network Security and Contagion","author":"D Acemoglu","year":"2013","unstructured":"Acemoglu, D., Malekian, A., Ozdaglar, A.: Network Security and Contagion. MIT Mimeo, New York (2013)"},{"issue":"6","key":"23_CR2","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1016\/j.jcss.2006.02.003","volume":"72","author":"J Aspnes","year":"2006","unstructured":"Aspnes, J., Chang, K., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum-of-squares partition problem. J. Comput. Syst. Sci. 72(6), 1077\u20131093 (2006)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"23_CR3","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1002\/net.20300","volume":"54","author":"F Boesch","year":"2009","unstructured":"Boesch, F., Satyanarayana, A., Suffel, C.: A survey of some network reliability analysis and synthesis results. Networks 54(2), 99\u2013107 (2009)","journal-title":"Networks"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Cerdeiro, D., Dziubi\u0144ski, M., Goyal, S.: Individual security and network design. In: Proceedings of the Fifteenth ACM Conference on Economics and Computation, EC 2014, pp. 205\u2013206. ACM, New York (2014)","DOI":"10.1145\/2600057.2602894"},{"issue":"3","key":"23_CR5","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1145\/3828.3829","volume":"32","author":"W Cunningham","year":"1985","unstructured":"Cunningham, W.: Optimal attack and reinforcement of a network. J. ACM 32(3), 549\u201361 (1985)","journal-title":"J. ACM"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-13075-0_23","volume-title":"Algorithms and Computation","author":"PG Drange","year":"2014","unstructured":"Drange, P.G., Dregi, M.S., Hof, P.: On the computational complexity of vertex integrity and component order connectivity. In: Ahn, H.-K., Shin, C.-S. (eds.) ISAAC 2014. LNCS, vol. 8889, pp. 285\u2013297. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-13075-0_23"},{"issue":"1","key":"23_CR7","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.geb.2012.12.007","volume":"79","author":"M Dziubi\u0144ski","year":"2013","unstructured":"Dziubi\u0144ski, M., Goyal, S.: Network design and defence. Games Econ. Behav. 79(1), 30\u201343 (2013)","journal-title":"Games Econ. Behav."},{"issue":"4","key":"23_CR8","doi-asserted-by":"crossref","first-page":"1518","DOI":"10.1093\/restud\/rdu013","volume":"81","author":"S Goyal","year":"2014","unstructured":"Goyal, S., Vigier, A.: Attack, defence, and contagion in networks. Rev. Econ. Stud. 81(4), 1518\u20131542 (2014)","journal-title":"Rev. Econ. Stud."},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Gueye, A., Marbukh, V.: Towards a metric for communication network vulnerability to attacks: a game theoretic approach. In: Proceedings of the 3rd International ICTS Conference on Game Theory for Networks, GameNets 2012 (2012)","DOI":"10.1007\/978-3-642-35582-0_20"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-17197-0_1","volume-title":"Decision and Game Theory for Security","author":"A Gueye","year":"2010","unstructured":"Gueye, A., Walrand, J.C., Anantharam, V.: Design of network topology in an adversarial environment. In: Alpcan, T., Butty\u00e1n, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 1\u201320. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-17197-0_1"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Gueye, A., Walrand, J., Anantharam, V.: A network topology design game: how to choose communication links in an adversarial environment. In: Proceedings of the 2nd International ICTS Conference on Game Theory for Networks, GameNets 2011 (2011)","DOI":"10.1007\/978-3-642-30373-9_17"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-642-25510-6_18","volume-title":"Internet and Network Economics","author":"J He","year":"2011","unstructured":"He, J., Liang, H., Yuan, H.: Controlling infection by blocking nodes and links simultaneously. In: Chen, N., Elkind, E., Koutsoupias, E. (eds.) Internet and Network Economics. Lecture Notes in Computer Science, vol. 7090, pp. 206\u2013217. Springer, Berlin Heidelberg (2011)"},{"issue":"3","key":"23_CR13","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1609\/aimag.v33i3.2420","volume":"33","author":"M Jain","year":"2012","unstructured":"Jain, M., An, B., Tambe, M.: An overview of recent application trends at the AAMAS conference: security, sustainability and safety. AI Mag. 33(3), 14\u201328 (2012)","journal-title":"AI Mag."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Kimura, M., Saito, K., Motoda, H.: Blocking links to minimize contamination spread in a social network. ACM Trans. Knowl. Discovery Data 3(2), 9: 1\u20139: 23 (2009)","DOI":"10.1145\/1514888.1514892"},{"key":"23_CR15","unstructured":"Kovenock, D., Roberson, B.: The optimal defense of networks of targets. Purdue University Economics Working Papers 1251, Purdue University, Department of Economics (2010)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Laszka, A., Szeszl\u00e9r, D., Butty\u00e1n, L.: Game-theoretic robustness of many-to-one networks. In: Proceedings of the 3rd International ICTS Conference on Game Theory for Networks, GameNets 2012 (2012)","DOI":"10.1007\/978-3-642-35582-0_7"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Laszka, A., Szeszl\u00e9r, D., Butty\u00e1n, L.: Linear loss function for the network blocking game: an efficient model for measuring network robustness and link criticality. In: Proceedings of the 3rd International Conference on Decision and Game Theory for Security, GameSec 2012 (2012)","DOI":"10.1007\/978-3-642-34266-0_9"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: A local mean field analysis of security investments in networks. In: Feigenbaum, J., Yang, Y.R. (eds.) NetEcon, pp. 25\u201330. ACM (2008)","DOI":"10.1145\/1403027.1403034"},{"issue":"1","key":"23_CR19","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/1384529.1375463","volume":"36","author":"M Lelarge","year":"2008","unstructured":"Lelarge, M., Bolot, J.: Network externalities and the deployment of security features and protocols in the internet. ACM SIGMETRICS Perform. Eval. Rev. - SIGMETRICS 36(1), 37\u201348 (2008)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev. - SIGMETRICS"},{"issue":"2","key":"23_CR20","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1080\/15427951.2009.10129181","volume":"6","author":"T Moscibroda","year":"2009","unstructured":"Moscibroda, T., Schmid, S., Wattenhofer, R.: The price of malice: a game-theoretic framework for malicious behavior. Internet Math. 6(2), 125\u2013156 (2009)","journal-title":"Internet Math."},{"key":"23_CR21","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1016\/j.artint.2012.11.004","volume":"195","author":"R Yang","year":"2013","unstructured":"Yang, R., Kiekintveld, C., Ord\u00f3nez, F., Tambe, M., John, R.: Improving resource allocation strategies against human adversaries in security games: an extended study. Artif. Intell. 195, 440\u2013469 (2013)","journal-title":"Artif. Intell."}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47413-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T19:01:56Z","timestamp":1657393316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47413-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319474120","9783319474137"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47413-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}