{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:22:29Z","timestamp":1759990949108,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642342653"},{"type":"electronic","value":"9783642342660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34266-0_7","type":"book-chapter","created":{"date-parts":[[2012,11,4]],"date-time":"2012-11-04T23:49:04Z","timestamp":1352072944000},"page":"118-137","source":"Crossref","is-referenced-by-count":16,"title":["Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality"],"prefix":"10.1007","author":[{"given":"Jingqiang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiwu","family":"Jing","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: IEEE Conference on Decision and Control (CDC), pp. 2595\u20132600 (2003)","key":"7_CR1","DOI":"10.1109\/CDC.2003.1273013"},{"doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: ACM Conference on Computer Communications Security (CCS), pp. 217\u2013224 (2002)","key":"7_CR2","DOI":"10.1145\/586139.586140"},{"doi-asserted-by":"crossref","unstructured":"Beckery, S., Seibert, J., et al.: Applying game theory to analyze attacks and defenses in virtual coordinate systems. In: IEEE\/IFIP Conference on Dependable Systems and Networks (DSN), pp. 133\u2013144 (2011)","key":"7_CR3","DOI":"10.1109\/DSN.2011.5958213"},{"unstructured":"Bohme, R., Moore, T.: The iterated weakest link: A model of adaptive security investment. In: Workshop on Economics of Information Security (WEIS) (2009)","key":"7_CR4"},{"doi-asserted-by":"crossref","unstructured":"Cheung, S., Lindqvist, U., Fong, M.: Modeling multistep cyber attacks for scenario recognition. In: DARPA Information Survivability Conference and Exposition (DISCEX), pp. 284\u2013292 (2003)","key":"7_CR5","DOI":"10.1109\/DISCEX.2003.1194892"},{"doi-asserted-by":"crossref","unstructured":"Estiri, M., Khademzadeh, A.: A theoretical signaling game model for intrusion detection in wireless sensor networks. In: International Telecommunications Network Strategy and Planning Symposium (Networks), pp. 1\u20136 (2010)","key":"7_CR6","DOI":"10.1109\/CCECE.2010.5575157"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-03549-4_10","volume-title":"Financial Cryptography and Data Security","author":"N. Fultz","year":"2009","unstructured":"Fultz, N., Grossklags, J.: Blue versus Red: Towards a Model of Distributed Security Attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 167\u2013183. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Gibbons, R.: Game Theory for Applied Economists. Princeton Press (1992)","key":"7_CR8","DOI":"10.2307\/j.ctvcmxrzd"},{"doi-asserted-by":"crossref","unstructured":"Khouzani, M., Sarkar, S., Altman, E.: A dynamic game solution to malware attack. In: IEEE INFOCOM, pp. 2138\u20132146 (2011)","key":"7_CR9","DOI":"10.1109\/INFCOM.2011.5935025"},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/TSMCB.2009.2035929","volume":"40","author":"F. Li","year":"2010","unstructured":"Li, F., Yang, Y., Wu, J.: Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs. IEEE Transactions on Systems, Man and Cybernetics - Part B: Cybernetics\u00a040(3), 612\u2013622 (2010)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics - Part B: Cybernetics"},{"doi-asserted-by":"crossref","unstructured":"Liu, P., Zang, W.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. In: ACM Conference on Computer Communications Security (CCS), pp. 179\u2013189 (2003)","key":"7_CR11","DOI":"10.1145\/948134.948135"},{"doi-asserted-by":"crossref","unstructured":"Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: International Workshop on Game Theory for Communications and Networks (GameNets), pp. 3\u201314 (2006)","key":"7_CR12","DOI":"10.1145\/1190195.1190198"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.4236\/jis.2010.11005","volume":"1","author":"Y. Luo","year":"2010","unstructured":"Luo, Y., Szidarovszky, F., et al.: Game theory based network security. Journal of Information Security\u00a01(1), 41\u201344 (2010)","journal-title":"Journal of Information Security"},{"unstructured":"Lye, K., Wing, J.: Game strategies in network security (extended abstract). In: IEEE Computer Security Foundations Workshop (CSFW), pp. 2\u201311 (2002)","key":"7_CR14"},{"doi-asserted-by":"crossref","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: A complete guide to the common vulnerability scoring system (version 2.0). Forum of Incident Response and Security Teams (2007)","key":"7_CR15","DOI":"10.1049\/iet-ifs:20060055"},{"unstructured":"National Institute of Standards and Technology, USA. National vulnerability database (2010), http:\/\/nvd.nist.gov\/home.cfm","key":"7_CR16"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, K., Alpcan, T., Basar, T.: Security games with incomplete information. In: IEEE International Conference on Communications (ICC), pp. 714\u2013719 (2009)","key":"7_CR17","DOI":"10.1109\/ICC.2009.5199443"},{"doi-asserted-by":"crossref","unstructured":"Ning, P., Cui, Y., Reeves, D.: Constructing attack scenarios through correlation of intrusion alerts. In: ACM Conference on Computer Communications Security (CCS), pp. 245\u2013254 (2002)","key":"7_CR18","DOI":"10.1145\/586143.586144"},{"doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S., et al: Efficient minimum-cost network hardening via exploit dependency graphs. In: Annual Computer Security Applications Conference (ACSAC), pp. 86\u201395 (2003)","key":"7_CR19","DOI":"10.1109\/CSAC.2003.1254313"},{"doi-asserted-by":"crossref","unstructured":"Ou, X., Boyer, W., McQueen, M.: A scalable approach to attack graph generation. In: ACM Conference on Computer Communications Security (CCS), pp. 336\u2013345 (2006)","key":"7_CR20","DOI":"10.1145\/1180405.1180446"},{"unstructured":"Patcha, A., Park, J.-M.: A game theoretic approach to modeling intrusion detection in mobile ad hoc networks. In: IEEE Workshop on Information Assurance and Security, pp. 1555\u20131559 (2004)","key":"7_CR21"},{"issue":"5","key":"7_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.4304\/jnw.1.5.31-42","volume":"1","author":"K. Sallhammar","year":"2006","unstructured":"Sallhammar, K., Helvik, B., Knapskog, S.: On stochastic modeling for integrated security and dependability evaluation. Journal of Networks\u00a01(5), 31\u201342 (2006)","journal-title":"Journal of Networks"},{"unstructured":"Schiffman, M., Eschelbeck, G., et al.: CVSS: A common vulnerability scoring system. National Infrastructure Advisory Council (2004)","key":"7_CR23"},{"doi-asserted-by":"crossref","unstructured":"Shen, D., Chen, G., et al.: Adaptive Markov game theoretic data fusion approach for cyber network defense. In: IEEE Military Communications Conference (MILCOM), pp. 1\u20137 (2007)","key":"7_CR24","DOI":"10.1109\/MILCOM.2007.4454758"},{"unstructured":"Sheyner, O., Haines, J., et al.: Automated generation and analysis of attack graphs. In: IEEE Symposium on Security and Privacy (S&P), pp. 254\u2013265 (2002)","key":"7_CR25"},{"issue":"3","key":"7_CR26","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/TDSC.2004.21","volume":"1","author":"F. Valeur","year":"2004","unstructured":"Valeur, F., Vigna, G., et al.: A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing\u00a01(3), 146\u2013169 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"doi-asserted-by":"crossref","unstructured":"Wang, W., Chatterjee, M., Kwiat, K.: Coexistence with malicious nodes: A game theoretic approach. In: ICST International Conference on Game Theory for Networks (GameNets), pp. 277\u2013286 (2009)","key":"7_CR27","DOI":"10.1109\/GAMENETS.2009.5137411"},{"doi-asserted-by":"crossref","unstructured":"Xie, P., Li, J., et al.: Using Bayesian networks for cyber security analysis. In: IEEE\/IFIP Conference on Dependable Systems and Networks (DSN), pp. 211\u2013220 (2010)","key":"7_CR28","DOI":"10.1109\/DSN.2010.5544924"},{"issue":"3","key":"7_CR29","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/j.jnca.2008.07.011","volume":"32","author":"Z. Zhang","year":"2009","unstructured":"Zhang, Z., Ho, P.-H.: Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks. Journal of Network and Computer Applications\u00a032(3), 710\u2013720 (2009)","journal-title":"Journal of Network and Computer Applications"},{"doi-asserted-by":"crossref","unstructured":"Zhu, Q., Basar, T.: Dynamic policy-based IDS configuration. In: IEEE Conference on Decision and Control (CDC), pp. 8600\u20138605 (2009)","key":"7_CR30","DOI":"10.1109\/CDC.2009.5399894"},{"doi-asserted-by":"crossref","unstructured":"Zonouz, S., Khurana, H., et al.: RRE: A game-theoretic intrusion response and recovery engine. In: IEEE\/IFIP Conference on Dependable Systems and Networks (DSN), pp. 439\u2013448 (2009)","key":"7_CR31","DOI":"10.1109\/DSN.2009.5270307"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34266-0_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T06:11:10Z","timestamp":1745129470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34266-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642342653","9783642342660"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34266-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}