{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:15:00Z","timestamp":1750997700301,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685410"},{"type":"electronic","value":"9783319685427"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68542-7_6","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T15:23:50Z","timestamp":1509549830000},"page":"62-71","source":"Crossref","is-referenced-by-count":5,"title":["Bayesian Game Based Pseudo Honeypot Model in Social Networks"],"prefix":"10.1007","author":[{"given":"Miao","family":"Du","sequence":"first","affiliation":[]},{"given":"Yongzhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"key":"6_CR1","unstructured":"The State of Social Media 2011: Social is the new normal (2011). http:\/\/www.briansolis.com\/2011\/10\/state-of-social-media-2011\/"},{"key":"6_CR2","unstructured":"Facebook Statistics. http:\/\/www.statisticbrain.com\/facebook-statistics\/"},{"issue":"99","key":"6_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TBDATA.2017.2702176","volume":"PP","author":"K Wang","year":"2017","unstructured":"Wang, K., Yu, J., Liu, X., Guo, S.: A pre-authentication approach to proxy re-encryption in big data context. IEEE Trans. Big Data PP(99), 1 (2017)","journal-title":"IEEE Trans. Big Data"},{"issue":"6","key":"6_CR4","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/TDSC.2014.2302298","volume":"11","author":"T Jin","year":"2014","unstructured":"Jin, T., Yu, C., Yong, H., Wei, S.: SIP flooding attack detection with a multi-dimensional sketch design. IEEE Trans. Dependable Secure Comput. 11(6), 582\u2013595 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"99","key":"6_CR5","first-page":"1","volume":"PP","author":"M Du","year":"2017","unstructured":"Du, M., Wang, K., Liu, X., Guo, S., Zhang, Y.: A differential privacy-based query model for sustainable fog data centers. IEEE Trans. Sustain. Comput. PP(99), 1 (2017)","journal-title":"IEEE Trans. Sustain. Comput."},{"issue":"4","key":"6_CR6","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against DDoS flooding attacks. IEEE Commun. Surveys Tuts. 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"1","key":"6_CR7","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/2886100","volume":"16","author":"K Wang","year":"2016","unstructured":"Wang, K., Du, M., Yang, D., Zhu, C., Shen, J., Zhang, Y.: Game theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Trans. Embedded Comput. Syst. 16(1), 18 (2016)","journal-title":"ACM Trans. Embedded Comput. Syst."},{"key":"6_CR8","unstructured":"How Much Does a DDoS Attack Cost.html. http:\/\/www.internetnews.com\/security\/article.php\/3933046\/"},{"issue":"2","key":"6_CR9","first-page":"317","volume":"28","author":"K Wang","year":"2012","unstructured":"Wang, K., Wu, M.: Nash equilibrium of node cooperation based on metamodel for MANETs. J. Inf. Sci. Eng. 28(2), 317\u2013333 (2012)","journal-title":"J. Inf. Sci. Eng."},{"issue":"1","key":"6_CR10","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/1216370.1216373","volume":"39","author":"T Peng","year":"2007","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Survey of networkbased defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1), 60\u201367 (2007)","journal-title":"ACM Comput. Surv."},{"issue":"6","key":"6_CR11","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/TII.2016.2537788","volume":"12","author":"K Wang","year":"2016","unstructured":"Wang, K., Zhuo, L., Shao, Y., Yue, D., Tsang, K.F.: Toward distributed data processing on intelligent leakpoints prediction in petrochemical industries. IEEE Trans. Ind. Inf. 12(6), 2091\u20132102 (2016)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"4","key":"6_CR12","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TDSC.2013.8","volume":"10","author":"C Chun-Jen","year":"2013","unstructured":"Chun-Jen, C., Khatkar, P., Tianyi, X., Jeongkeun, L., Dijiang, H.: NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secure Comput. 10(4), 198\u2013211 (2013)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6_CR13","doi-asserted-by":"crossref","first-page":"3844","DOI":"10.1109\/ACCESS.2016.2580581","volume":"4","author":"H Jiang","year":"2016","unstructured":"Jiang, H., Wang, K., Wang, Y., Gao, M., Zhang, Y.: Energy big data: a survey. IEEE Access 4, 3844\u20133861 (2016)","journal-title":"IEEE Access"},{"issue":"12","key":"6_CR14","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MCOM.2016.1600399CM","volume":"54","author":"K Wang","year":"2016","unstructured":"Wang, K., Wang, Y., Sun, Y., Guo, S., Wu, J.: Green industrial Internet of Things architecture: an energy-efficient perspective. IEEE Commun. Mag. 54(12), 48\u201354 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Beham, M., Vlad, M., Reiser, H.P.: Intrusion detection and honeypots in nested virtualization environments. In: Proceeding of IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 1\u20136 (2016)","DOI":"10.1109\/DSN.2013.6575329"},{"key":"6_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2639827","author":"K Wang","year":"2016","unstructured":"Wang, K., Yuan, L., Mizayaki, T., Sun, Y., Guo, S.: Anti-eavesdropping with selfish jamming in wireless networks: a bertrand game approach. IEEE Trans. Veh. Technol. (2016). doi: 10.1109\/TVT.2016.2639827","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"7","key":"6_CR17","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1109\/TIFS.2014.2321034","volume":"9","author":"J Luo","year":"2014","unstructured":"Luo, J., Yang, X., Wang, J., Xu, J., Sun, J., Long, K.: On a mathematical model for low-rate shrew DDoS. IEEE Trans. Inf. Forensics Secur. 9(7), 1069\u20131083 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"6_CR18","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1109\/TII.2015.2426015","volume":"11","author":"K Wang","year":"2015","unstructured":"Wang, K., Ouyang, Z., Krishnan, R., Shu, L., He, L.: A game theory based energy management system using price elasticity for smart grids. IEEE Trans. Ind. Inf. 11(6), 1607\u20131616 (2015)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"6_CR19","unstructured":"Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceeding of Network and Distributed Systems Security, pp. 191\u2013206 (2003)"},{"issue":"6","key":"6_CR20","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MNET.2016.1600113NM","volume":"30","author":"K Wang","year":"2016","unstructured":"Wang, K., Du, M., Sun, Y., Vinel, A., Zhang, Y.: Attack detection and distributed forensics in M2M networks. IEEE Netw. 30(6), 49\u201355 (2016)","journal-title":"IEEE Netw."},{"issue":"11","key":"6_CR21","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1109\/TIFS.2013.2279800","volume":"8","author":"Z Zhan","year":"2013","unstructured":"Zhan, Z., Xu, M., Xu, S.: Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE Trans. Inf. Forensics Security 8(11), 1775\u20131789 (2013)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"6_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2670144","author":"K Wang","year":"2017","unstructured":"Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid (2017). doi: 10.1109\/TSG.2017.2670144","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68542-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T20:44:34Z","timestamp":1750970674000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68542-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685410","9783319685427"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68542-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}