{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T04:53:45Z","timestamp":1770785625907,"version":"3.50.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319763538","type":"print"},{"value":"9783319763545","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76354-5_24","type":"book-chapter","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T11:43:48Z","timestamp":1520595828000},"page":"266-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Modeling an Anomaly-Based Intrusion Prevention System Using Game Theory"],"prefix":"10.1007","author":[{"given":"El Mehdi","family":"Kandoussi","sequence":"first","affiliation":[]},{"given":"Iman","family":"El Mir","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Hanini","sequence":"additional","affiliation":[]},{"given":"Abdelkrim","family":"Haqiq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Hock, F., Korti\u0161, P.: Commercial and open-source based Intrusion Detection System and Intrusion Prevention System (IDS\/IPS) design for an IP networks. In: 13th International Conference on Emerging eLearning Technologies and Applications (ICETA), Slovakia, pp. 1\u20134. IEEE (2015)","DOI":"10.1109\/ICETA.2015.7558466"},{"issue":"1","key":"24_CR3","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Ajay Kumara, M.A, Jaidhar, C.D: Hypervisor and virtual machine dependent intrusion detection and prevention system for virtualized cloud environment. In: 1st International Conference on Telematics and Future Generation Networks (TAFGEN), Malaysia, pp. 28\u201333. IEEE (2015)","DOI":"10.1109\/TAFGEN.2015.7289570"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"El Mir, I., Kim, D.S., Haqiq, A.: Security modeling and analysis of an intrusion tolerant cloud data center. In: Third World Conference Complex Systems (WCCS), Morocco, pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/ICoCS.2015.7483264"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"El Mir, I., Kim, D.S., Haqiq, A.: Security modeling and analysis of a self-cleansing intrusion tolerance technique. In: 11th International Conference Information Assurance and Security (IAS), Morocco, pp. 111\u2013117. IEEE (2015)","DOI":"10.1109\/ISIAS.2015.7492754"},{"issue":"9","key":"24_CR7","first-page":"345","volume":"3","author":"I El Mir","year":"2017","unstructured":"El Mir, I., Kandoussi, E.M., Hanini, M., Kim, D.S., Haqiq, A.: A game theoretic approach based virtual machine migration for cloud environment security. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 3(9), 345\u2013357 (2017)","journal-title":"Int. J. Commun. Netw. Inf. Secur. (IJCNIS)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On modeling and simulation of game theory based defense mechanisms against Dos and DDoS attacks. In: The spring Simulation Multiconference, pp. 312\u2013318. ACM, San Diego (2010)","DOI":"10.1145\/1878537.1878703"},{"issue":"1","key":"24_CR9","first-page":"27","volume":"2","author":"EO Ibidunmoye","year":"2013","unstructured":"Ibidunmoye, E.O., Alese, B.K., Ogundele, O.S.: Modeling attacker-defender interaction as a zero-sum stochastic game. J. Comput. Sci. Appl. 2(1), 27\u201332 (2013)","journal-title":"J. Comput. Sci. Appl."},{"key":"24_CR10","volume-title":"Network Security: A Decision and Game-Theoretic Approach","author":"T Alpcan","year":"2010","unstructured":"Alpcan, T., Basar, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press, New York (2010)"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Kamhoua, C.A., Kwiat, L., Kwiat, K.A., Park, J.S., Zhao, M., Rodriguez, M.: Game theoretic modeling of security and interdependency in a public cloud. In: 7th International Conference Cloud Computing (CLOUD), USA, pp. 514\u2013521. IEEE (2014)","DOI":"10.1109\/CLOUD.2014.75"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Kwiat, L., Kamhoua, C.A., Kwiat, K.A., Tang, J., Martin, A.: Security-aware virtual machine allocation in the cloud: a game theoretic approach. In: 8th International Conference Cloud Computing (CLOUD), New York, pp. 556\u2013563. IEEE (2015)","DOI":"10.1109\/CLOUD.2015.80"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Van, N.T., Thinh, T.N., Sach, L.T.: An anomaly-based network intrusion detection system using deep learning. In: 2017 International Conference on System Science and Engineering (ICSSE), Ho Chi Minh City, pp. 210\u2013214. IEEE (2017)","DOI":"10.1109\/ICSSE.2017.8030867"},{"issue":"9","key":"24_CR14","doi-asserted-by":"crossref","first-page":"4863","DOI":"10.1002\/sec.1661","volume":"18","author":"B Subba","year":"2016","unstructured":"Subba, B., Biswas, S., Karmakar, S.: False alarm reduction in signature-based IDS: game theory approach. Secur. Commun. Netw. 18(9), 4863\u20134881 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"8","key":"24_CR15","doi-asserted-by":"crossref","first-page":"2474","DOI":"10.1109\/TSG.2017.2670144","volume":"5","author":"K Wang","year":"2017","unstructured":"Wang, K., Du, M., Maharjan, S., et al.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid 5(8), 2474\u20132482 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"73","key":"24_CR16","doi-asserted-by":"crossref","first-page":"4407","DOI":"10.1007\/s11227-017-2025-7","volume":"10","author":"A Nezarat","year":"2017","unstructured":"Nezarat, A., Shams, Y.: A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment. J. Supercomput. 10(73), 4407\u20134427 (2017)","journal-title":"J. Supercomput."}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76354-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T16:51:32Z","timestamp":1751475092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76354-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763538","9783319763545"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76354-5_24","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}