{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:44:13Z","timestamp":1725911053775},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319675398"},{"type":"electronic","value":"9783319675404"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67540-4_8","type":"book-chapter","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T06:23:14Z","timestamp":1505456594000},"page":"86-96","source":"Crossref","is-referenced-by-count":4,"title":["A Dynamic Incentive Mechanism for Security in Networks of Interdependent Agents"],"prefix":"10.1007","author":[{"given":"Farzaneh","family":"Farhadi","sequence":"first","affiliation":[]},{"given":"Hamidreza","family":"Tavafoghi","sequence":"additional","affiliation":[]},{"given":"Demosthenis","family":"Teneketzis","sequence":"additional","affiliation":[]},{"given":"Jamal","family":"Golestani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"issue":"6","key":"8_CR1","doi-asserted-by":"crossref","first-page":"2463","DOI":"10.3982\/ECTA6995","volume":"81","author":"S Athey","year":"2013","unstructured":"Athey, S., Segal, I.: An efficient dynamic mechanism. Econometrica 81(6), 2463\u20132485 (2013)","journal-title":"Econometrica"},{"issue":"3","key":"8_CR2","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1111\/1468-0262.00317","volume":"70","author":"D Bergemann","year":"2002","unstructured":"Bergemann, D., V\u00e4lim\u00e4ki, J.: Information acquisition and efficient mechanism design. Econometrica 70(3), 1007\u20131033 (2002)","journal-title":"Econometrica"},{"key":"8_CR3","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199734023.001.0001","volume-title":"An Introduction to the Theory of Mechanism Design","author":"T B\u00f6rgers","year":"2015","unstructured":"B\u00f6rgers, T., Krahmer, D., Strausz, R.: An Introduction to the Theory of Mechanism Design. Oxford University Press, Oxford (2015)"},{"issue":"2","key":"8_CR4","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/TIFS.2009.2019154","volume":"4","author":"L Chen","year":"2009","unstructured":"Chen, L., Leneutre, J.: A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inf. Forensics Secur. 4(2), 165\u2013178 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR5","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.2307\/1913096","volume":"56","author":"J Cremer","year":"1988","unstructured":"Cremer, J., McLean, R.P.: Full extraction of the surplus in bayesian and dominant strategy auctions. Econometrica 56, 1247\u20131258 (1988)","journal-title":"Econometrica"},{"key":"8_CR6","unstructured":"Farhadi, F., Golestani, S.J.: Mechanism design for network resource allocation: a surrogate optimization approach (2016). http:\/\/ee.sharif.edu\/~farhadi\/Surrogate-Optimization-Approach.pdf"},{"key":"8_CR7","unstructured":"Farhadi, F., Tavafoghi, H., Teneketzis, D., Golestani, S.J.: A dynamic incentive mechanism for security in networks of interdependent agents (2016). http:\/\/ee.sharif.edu\/~farhadi\/Dynamic-Incentive-Mechanism.pdf"},{"key":"8_CR8","unstructured":"Fazeli, A., Ajorlou, A., Jadbabaie, A.: Competitive diffusion in social networks: quality or seeding? IEEE Trans. Control Netw. Syst. PP(99), 1 (2016)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Jackson, M., Zenou, Y.: Games on networks. In: Handbook of Game Theory with Economic Applications, vol. 4. Elsevier (2015)","DOI":"10.1016\/B978-0-444-53766-9.00003-3"},{"issue":"2","key":"8_CR10","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1109\/TNET.2010.2071397","volume":"19","author":"L Jiang","year":"2011","unstructured":"Jiang, L., Anantharam, V., Walrand, J.: How bad are selfish investments in network security? IEEE\/ACM Trans. Netw. 19(2), 549\u2013560 (2011)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"2","key":"8_CR11","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/TAC.2011.2163353","volume":"57","author":"A Kakhbod","year":"2012","unstructured":"Kakhbod, A., Teneketzis, D.: An efficient game form for unicast service provisioning. IEEE Trans. Autom. Control 57(2), 392\u2013404 (2012)","journal-title":"IEEE Trans. Autom. Control"},{"key":"8_CR12","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1057\/palgrave.jors.2600523","volume":"49","author":"F Kelly","year":"1998","unstructured":"Kelly, F., Maulloo, A., Tan, D.: Rate control for communication networks: shadow prices, proportional fairness and stability. J. Oper. Res. Soc. 49, 237\u2013252 (1998)","journal-title":"J. Oper. Res. Soc."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Khouzani, M.H.R., Sarkar, S., Altman, E.: A dynamic game solution to malware attack. In: IEEE INFOCOM, April 2011","DOI":"10.1109\/INFCOM.2011.5935025"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Kumar, P.R., Varaiya, P.: Stochastic Systems: Estimation, Identification, and Adaptive Control, vol. 75. SIAM (2015)","DOI":"10.1137\/1.9781611974263"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surv. 47(2), 1\u201338 (2014)","DOI":"10.1145\/2635673"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: Economic incentives to increase security in the internet: the case for insurance. In: IEEE INFOCOM, pp. 1494\u20131502 (2009)","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM, May 2007","DOI":"10.1109\/INFCOM.2007.155"},{"issue":"1","key":"8_CR18","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/SURV.2012.062612.00056","volume":"15","author":"X Liang","year":"2013","unstructured":"Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15(1), 101\u2013120 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Liu, H.: Efficient dynamic mechanisms in environments with interdependent valuations. SSRN 2504731 (2014)","DOI":"10.2139\/ssrn.2504731"},{"issue":"2","key":"8_CR20","first-page":"323","volume":"54","author":"RB Myerson","year":"1986","unstructured":"Myerson, R.B.: Multistage games with communication. Econom. J. Econom. Soc. 54(2), 323\u2013358 (1986)","journal-title":"Econom. J. Econom. Soc."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Naghizadeh, P., Liu, M.: On the role of public and private assessments in security information sharing agreements. arXiv preprint arXiv:1604.04871 (2016)","DOI":"10.1109\/ITA.2016.7888179"},{"issue":"12","key":"8_CR22","doi-asserted-by":"crossref","first-page":"2790","DOI":"10.1109\/TIFS.2016.2599005","volume":"11","author":"P Naghizadeh","year":"2016","unstructured":"Naghizadeh, P., Liu, M.: Opting out of incentive mechanisms: a study of security as a non-excludable public good. IEEE Trans. Inf. Forensics Secur. 11(12), 2790\u20132803 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR23","unstructured":"Nowzari, C., Preciado, V.M., Pappas, G.J.: Analysis and control of epidemics: a survey of spreading processes on complex networks. arXiv:1505.00768 (2015)"},{"issue":"4","key":"8_CR24","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1109\/TCNS.2015.2426755","volume":"2","author":"S Trajanovski","year":"2015","unstructured":"Trajanovski, S., Hayel, Y., Altman, E., Wang, H., Mieghem, P.V.: Decentralized protection strategies against SIS epidemics in networks. IEEE Trans. Control Netw. Syst. 2(4), 406\u2013419 (2015)","journal-title":"IEEE Trans. Control Netw. Syst."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Game Theory for Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67540-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T10:33:46Z","timestamp":1570098826000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67540-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319675398","9783319675404"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67540-4_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}