{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:12:48Z","timestamp":1725891168083},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540857341"},{"type":"electronic","value":"9783540857358"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85735-8_15","type":"book-chapter","created":{"date-parts":[[2008,8,22]],"date-time":"2008-08-22T12:47:03Z","timestamp":1219409223000},"page":"151-162","source":"Crossref","is-referenced-by-count":2,"title":["A Generic Intrusion Detection Game Model in IT Security"],"prefix":"10.1007","author":[{"given":"Ioanna","family":"Kantzavelou","sequence":"first","affiliation":[]},{"given":"Sokratis","family":"Katsikas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1053291.1053309","volume":"48","author":"P. Denning","year":"2005","unstructured":"Denning, P.: Is Computer Science Science? Communication of the ACM\u00a048(4), 27\u201331 (2005)","journal-title":"Communication of the ACM"},{"key":"15_CR2","first-page":"391","volume-title":"Handbook of Defeasible Reasoning and Uncertainty Management Systems","author":"B. Skyrms","year":"1998","unstructured":"Skyrms, B., Vanderschraaf, P.: Game theory. In: Gabbay, D.M., Smets, P. (eds.) Handbook of Defeasible Reasoning and Uncertainty Management Systems, pp. 391\u2013439. Kluwer Academic Publishers, Dordrecht (1998)"},{"issue":"5","key":"15_CR3","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/TAC.2003.811254","volume":"48","author":"Y. Ho","year":"2003","unstructured":"Ho, Y., Zhao, Q., Pepyne, D.: The No Free Lunch Theorems: Complexity and Security. IEEE Transactions on Automatic Control\u00a048(5), 783\u2013793 (2003)","journal-title":"IEEE Transactions on Automatic Control"},{"key":"15_CR4","unstructured":"Cavusoglu, H., Raghunathan, S.: Configuration of Intrusion Detection System: A Comparison of Decision and Game Theoretic Approaches. In: Proc. of the 24th International Conference on Information Systems, pp. 692\u2013705 (December 2003)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Basar, T.: A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection. In: Proc. of the 42rd IEEE Conference on Decision and Control (CDC), Maki, HI, pp. 2595\u20132600 (December 2003)","DOI":"10.1109\/CDC.2003.1273013"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Basar, T.: A Game Theoretic Analysis of Intrusion Detection in Access Control Systems. In: Proc. of the 43rd IEEE Conference on Decision and Control (CDC), Paradise Island, Bahamas, pp. 1568\u20131573 (December 2004)","DOI":"10.1109\/CDC.2004.1430267"},{"key":"15_CR7","unstructured":"Lye, K., Wing, J.: Game Strategies in Network Security. In: Proc. of the Foundations of Computer Security Workshop, Copenhagen, Denmark (July 2003)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Kodialam, M., Lakshman, T.: Detecting Network Intrusions via Sampling: A Game Theoretic Approach. In: Proc. of the IEEE INFOCOM 2003, San Fransisco (March 2003)","DOI":"10.1109\/INFCOM.2003.1209210"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Patcha, A., Park, J.: A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks. In: Proc. of the 2004 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 280\u2013284 (June 2004)","DOI":"10.1109\/IAW.2004.1437828"},{"issue":"2","key":"15_CR10","first-page":"131","volume":"2","author":"A. Patcha","year":"2006","unstructured":"Patcha, A., Park, J.: A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks. International Journal of Network Security\u00a02(2), 131\u2013137 (2006)","journal-title":"International Journal of Network Security"},{"issue":"2","key":"15_CR11","first-page":"145","volume":"5","author":"A. Agah","year":"2007","unstructured":"Agah, A., Das, S.K.: Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. International Journal of Network Security\u00a05(2), 145\u2013153 (2007)","journal-title":"International Journal of Network Security"},{"key":"15_CR12","volume-title":"Game Theory and Economic Modelling","author":"D. Kreps","year":"2003","unstructured":"Kreps, D.: Game Theory and Economic Modelling. Oxford University Press, Oxford (2003)"},{"key":"15_CR13","unstructured":"Dixit, A., Skeath, S.: Games of Strategy. W. W. Norton & Company, Inc. (1999)"},{"key":"15_CR14","unstructured":"McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory, version 0.2007.01.30 (January 2007) (accessed May 20, 2008), \n                    \n                      http:\/\/gambit.sourceforge.net"},{"key":"15_CR15","volume-title":"An Introduction to Game Theory","author":"M.J. Osborne","year":"2004","unstructured":"Osborne, M.J.: An Introduction to Game Theory. Oxford University Press, New York (2004)"},{"key":"15_CR16","unstructured":"Levine, D.K.: Repeated Games Step-by-Step (May 2002) (accessed March 1, 2008), \n                    \n                      http:\/\/www.dklevine.com\/econ101\/repeated-step.pfd"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85735-8_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:47:56Z","timestamp":1619524076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85735-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540857341","9783540857358"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85735-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}