{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T04:03:56Z","timestamp":1751083436577,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_12","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T12:22:30Z","timestamp":1511266950000},"page":"137-149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating"],"prefix":"10.1007","author":[{"given":"Anesu M. C.","family":"Marufu","sequence":"first","affiliation":[]},{"given":"Anne V. D. M.","family":"Kayem","sequence":"additional","affiliation":[]},{"given":"Stephen D.","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"issue":"8","key":"12_CR1","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1016\/j.future.2011.04.009","volume":"27","author":"A Haque","year":"2011","unstructured":"Haque, A., Alhashmi, S.M., Parthiban, R.: A survey of economic models in grid computing. Future Gener. Comput. Syst. 27(8), 1056\u20131069 (2011)","journal-title":"Future Gener. Comput. Syst."},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-33331-1_15","volume-title":"Critical Information Infrastructures Security","author":"AMC Marufu","year":"2016","unstructured":"Marufu, A.M.C., Kayem, A.V.D.M., Wolthusen, S.D.: A distributed continuous double auction framework for resource constrained microgrids. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds.) CRITIS 2015. LNCS, vol. 9578, pp. 183\u2013196. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33331-1_15"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Marufu, A.M.C., Kayem, A.V.D.M., Wothulsen, S.D.: Fault-tolerant distributed continuous double auctioning on computationally constrained microgrids. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, pp. 448\u2013456. SCITEPRESS (2016)","DOI":"10.5220\/0005744304480456"},{"key":"12_CR4","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1007\/978-3-319-11310-4_69","volume-title":"Intelligent Systems\u20192014","author":"J Sta\u0144czak","year":"2015","unstructured":"Sta\u0144czak, J., Radziszewska, W., Nahorski, Z.: Dynamic pricing and balancing mechanism for a microgrid electricity market. In: Filev, D., Jab\u0142kowski, J., Kacprzyk, J., Krawczak, M., Popchev, I., Rutkowski, L., Sgurev, V., Sotirova, E., Szynkarczyk, P., Zadrozny, S. (eds.) Intelligent Systems\u20192014. AISC, vol. 323, pp. 793\u2013806. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-11310-4_69"},{"key":"12_CR5","unstructured":"De Luca, M., Cliff, D.: Human-agent auction interactions: adaptive-aggressive agents dominate. In: IJCAI Proceedings-International Joint Conference on Artificial Intelligence, vol. 22, p. 178. Citeseer (2011)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Tesauro, G., Bredin, J.L.: Strategic sequential bidding in auctions using dynamic programming. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 2, pp. 591\u2013598. ACM (2002)","DOI":"10.1145\/544862.544885"},{"key":"12_CR7","unstructured":"Vytelingum, P.: The structure and behaviour of the Continuous Double Auction. Ph.D. thesis, University of Southampton (2006)"},{"issue":"14","key":"12_CR8","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.1016\/j.artint.2008.06.001","volume":"172","author":"P Vytelingum","year":"2008","unstructured":"Vytelingum, P., Cliff, D., Jennings, N.R.: Strategic bidding in continuous double auctions. Artif. Intell. 172(14), 1700\u20131729 (2008)","journal-title":"Artif. Intell."},{"key":"12_CR9","unstructured":"Vach, D., Mar\u0161\u0144l, A.M.A.: Comparison of double auction bidding strategies for automated trading agents (2015)"},{"issue":"1","key":"12_CR10","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/S0899-8256(03)00045-9","volume":"46","author":"M Yokoo","year":"2004","unstructured":"Yokoo, M., Sakurai, Y., Matsubara, S.: The effect of false-name bids in combinatorial auctions: new fraud in Internet auctions. Games Econ. Behav. 46(1), 174\u2013188 (2004)","journal-title":"Games Econ. Behav."},{"issue":"1","key":"12_CR11","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.dss.2004.08.006","volume":"39","author":"R Porter","year":"2005","unstructured":"Porter, R., Shoham, Y.: On cheating in sealed-bid auctions. Decis. Support Syst. 39(1), 41\u201354 (2005)","journal-title":"Decis. Support Syst."},{"issue":"2","key":"12_CR12","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s00199-003-0423-y","volume":"24","author":"I Chakraborty","year":"2004","unstructured":"Chakraborty, I., Kosmopoulou, G.: Auctions with shill bidding. Econ. Theor. 24(2), 271\u2013287 (2004)","journal-title":"Econ. Theor."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Trevathan, J., Read, W.: Detecting shill bidding in online English auctions. In: Handbook of Research on Social and Organizational Liabilities in Information Security, p. 446. Information Science Reference, Hershey (2008)","DOI":"10.4018\/978-1-60566-132-2.ch027"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Wang, C., Leung, H.: Anonymity and security in continuous double auctions for internet retails market. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 10 pp. IEEE (2004)","DOI":"10.1109\/HICSS.2004.1265431"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Trevathan, J., Ghodosi, H., Read, W.: An anonymous and secure continuous double auction scheme. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS 2006, vol. 6, p. 125b. IEEE (2006)","DOI":"10.1109\/HICSS.2006.45"},{"issue":"4","key":"12_CR16","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.elerap.2006.12.003","volume":"6","author":"H Ma","year":"2008","unstructured":"Ma, H., Leung, H.-F.: An adaptive attitude bidding strategy for agents in continuous double auctions. Electron. Commer. Res. Appl. 6(4), 383\u2013398 (2008)","journal-title":"Electron. Commer. Res. Appl."},{"issue":"14","key":"12_CR17","doi-asserted-by":"crossref","first-page":"3223","DOI":"10.1016\/j.comcom.2008.05.009","volume":"31","author":"P Chaudhuri","year":"2008","unstructured":"Chaudhuri, P., Edward, T.: An algorithm for k-mutual exclusion in decentralized systems. Comput. Commun. 31(14), 3223\u20133235 (2008)","journal-title":"Comput. Commun."},{"key":"12_CR18","unstructured":"Parsons, S., Klein, M.: Towards robust multi-agent systems: handling communication exceptions in double auctions. In: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, vol. 3, pp. 1482\u20131483. IEEE Computer Society (2004)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T06:20:38Z","timestamp":1751005238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}