{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:48:30Z","timestamp":1725540510538},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642052897"},{"type":"electronic","value":"9783642052903"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05290-3_37","type":"book-chapter","created":{"date-parts":[[2009,11,6]],"date-time":"2009-11-06T13:12:29Z","timestamp":1257513149000},"page":"259-266","source":"Crossref","is-referenced-by-count":2,"title":["Network Security Validation Using Game Theory"],"prefix":"10.1007","author":[{"given":"Vicky","family":"Papadopoulou","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Gregoriades","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/ICRE.2002.1048527","volume-title":"Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering","author":"R. Crook","year":"2002","unstructured":"Crook, R., Ince, D., Lin, L., Nuseibeh, B.: Security requirements Engineering: When Anti-Requirements Hit the Fan. In: Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering, pp. 203\u2013205. IEEE Press, Los Alamitos (2002)"},{"issue":"5","key":"37_CR2","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/TSE.2005.59","volume":"31","author":"A. Gregoriades","year":"2005","unstructured":"Gregoriades, A., Sutcliffe, A.: Scenario-Based Assessment of Non-Functional Requirements. IEEE Transactions on Software Engineering\u00a031(5), 392\u2013409 (2005)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"37_CR3","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/ICSE.2004.1317437","volume-title":"Proceedings of the 26th International Conference on Software Engineering","author":"A. Lamsweerde van","year":"2004","unstructured":"van Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-Models. In: Proceedings of the 26th International Conference on Software Engineering, pp. 148\u2013157. IEEE Press, Los Alamitos (2004)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Mavronicolas, M., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: A Network Game with Attacker and Protector Entities. Algorithmica. In: Deng, X., Du, D. (eds.) Special Issue with selected papers from the 16th Annual International Symposium on Algorithms and Computation (ISAAC 2005), July 2008, vol.\u00a051(3), pp. 315\u2013341 (2008)","DOI":"10.1007\/s00453-007-9109-3"},{"key":"37_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/11821069_62","volume-title":"Mathematical Foundations of Computer Science 2006","author":"M. Mavronicolas","year":"2006","unstructured":"Mavronicolas, M., Michael, L., Papadopoulou, V.G., Philippou, A., Spirakis, P.G.: The price of defense. In: Kr\u00e1lovi\u010d, R., Urzyczyn, P. (eds.) MFCS 2006. LNCS, vol.\u00a04162, pp. 717\u2013728. Springer, Heidelberg (2006)"},{"issue":"2","key":"37_CR6","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J.F. Nash","year":"1951","unstructured":"Nash, J.F.: Non-cooperative Games. Annals of Mathematics\u00a054(2), 286\u2013295 (1951)","journal-title":"Annals of Mathematics"},{"key":"37_CR7","volume-title":"Introduction to Graph Theory","author":"D.B. West","year":"2001","unstructured":"West, D.B.: Introduction to Graph Theory, 2nd edn. Prentice Hall, Englewood Cliffs (2001)","edition":"2"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Markham, T., Payne, C.: Security at the Network Edge: A Distributed Firewall Architecture. In: Proceedings of the 2nd DARPA Information Survivability Conference and Exposition, June 2001, vol.\u00a01, pp. 279\u2013286 (2001)","DOI":"10.1109\/DISCEX.2001.932222"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2009 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05290-3_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:50:25Z","timestamp":1606186225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05290-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642052897","9783642052903"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05290-3_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}