{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:29:13Z","timestamp":1750746553520,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811659423"},{"type":"electronic","value":"9789811659430"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-5943-0_16","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T23:04:08Z","timestamp":1631228648000},"page":"190-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["IoT Security Situational Awareness Based on Q-Learning and Bayesian Game"],"prefix":"10.1007","author":[{"given":"Yang","family":"Li","sequence":"first","affiliation":[]},{"given":"Tianying","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"issue":"24","key":"16_CR1","first-page":"1","volume":"55","author":"L Shi","year":"2019","unstructured":"Shi, L., et al.: Survey of research on network security situation awareness. Comput. Eng. Appl. 55(24), 1\u20139 (2019)","journal-title":"Comput. Eng. Appl."},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.future.2018.04.007","volume":"85","author":"R Rapuzzi","year":"2018","unstructured":"Rapuzzi, R., Repetto, M.: Building situational awareness for network threats in fog\/edge computing: emerging paradigms beyond the security perimeter model. Futur. Gener. Comput. Syst. 85, 235\u2013249 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"9","key":"16_CR3","doi-asserted-by":"publisher","first-page":"2148","DOI":"10.3390\/s19092148","volume":"19","author":"M Park","year":"2019","unstructured":"Park, M., Oh, H., Lee, K.: Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective. Sensors 19(9), 2148 (2019)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Chouhan, P.K., McClean, S., Shackleton, M.: Situation assessment to secure IoT applications. In: 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, pp. 70\u201377. IEEE (2018)","key":"16_CR4","DOI":"10.1109\/IoTSMS.2018.8554802"},{"doi-asserted-by":"crossref","unstructured":"He, F., et al.: SCPN-based game model for security situational awareness in the intenet of things. In: 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1\u20135. IEEE (2018)","key":"16_CR5","DOI":"10.1109\/CNS.2018.8433188"},{"issue":"4","key":"16_CR6","doi-asserted-by":"publisher","first-page":"e1975","DOI":"10.1002\/nem.1975","volume":"27","author":"R Kaur","year":"2017","unstructured":"Kaur, R., Kaur, N., Sood, S.K.: Security in IoT network based on stochastic game net model. Int. J. Netw. Manag. 27(4), e1975 (2017)","journal-title":"Int. J. Netw. Manag."},{"issue":"3","key":"16_CR7","doi-asserted-by":"publisher","first-page":"495","DOI":"10.3724\/SP.J.1001.2011.03751","volume":"22","author":"Y Zhang","year":"2011","unstructured":"Zhang, Y., Tan, X.B., Cui, X.L., Xi, H.S.: Network security situation awareness approach based on Markov game model. J. Softw. 22(3), 495\u2013508 (2011)","journal-title":"J. Softw."},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"19505","DOI":"10.1109\/ACCESS.2017.2753278","volume":"5","author":"J Huang","year":"2017","unstructured":"Huang, J., Zhang, H., Wang, J.: Markov evolutionary games for network defense strategy selection. IEEE Access 5, 19505\u201319516 (2017)","journal-title":"IEEE Access"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/ACCESS.2016.2633983","volume":"5","author":"C Lei","year":"2017","unstructured":"Lei, C., Ma, D.H., Zhang, H.Q.: Optimal strategy selection for moving target defense based on Markov game. IEEE Access 5, 156\u2013169 (2017)","journal-title":"IEEE Access"},{"issue":"11","key":"16_CR10","first-page":"5631","volume":"13","author":"Z Wang","year":"2019","unstructured":"Wang, Z., et al.: Optimal network defense strategy selection based on Markov Bayesian game. KSII Trans. Internet Inform. Syst. 13(11), 5631\u20135652 (2019)","journal-title":"KSII Trans. Internet Inform. Syst."},{"unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press (2018)","key":"16_CR11"},{"issue":"01","key":"16_CR12","first-page":"144","volume":"43","author":"J Wang","year":"2016","unstructured":"Wang, J., Yu, D., Zhang, H., Wang, N.: Active defense strategy selection based on the static Bayesian game. J. Xidian Univ. 43(01), 144\u2013150 (2016)","journal-title":"J. Xidian Univ."},{"key":"16_CR13","first-page":"1039","volume":"4","author":"J Hu","year":"2003","unstructured":"Hu, J., Wellman, M.P.: Nash Q-learning for general-sum stochastic games. J. Mach. Learn. Res. 4, 1039\u20131069 (2003)","journal-title":"J. Mach. Learn. Res."},{"unstructured":"Gibbons, R.: A Primer in Game Theory (1992)","key":"16_CR14"},{"issue":"2","key":"16_CR15","first-page":"782","volume":"19","author":"B Subba","year":"2016","unstructured":"Subba, B., Biswas, S., Karmakar, S.: Intrusion detection in mobile ad-hoc networks: Bayesian game formulation. Eng. Sci. Technol. 19(2), 782\u2013799 (2016)","journal-title":"Eng. Sci. Technol."},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: A survey of game theoretic methods for cyber security. In: 2016 IEEE First International Conference on Data Science in Cyberspace (DSC), pp. 631\u2013636. IEEE (2016)","key":"16_CR16","DOI":"10.1109\/DSC.2016.90"},{"issue":"3\u20134","key":"16_CR17","first-page":"279","volume":"8","author":"CJCH Watkins","year":"1992","unstructured":"Watkins, C.J.C.H., Dayan, P.: Q-learning. Mach. Learn. 8(3\u20134), 279\u2013292 (1992)","journal-title":"Mach. Learn."},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.engappai.2014.02.001","volume":"32","author":"S Shamshirband","year":"2014","unstructured":"Shamshirband, S., et al.: Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng. Appl. Artif. Intell. 32, 228\u2013241 (2014)","journal-title":"Eng. Appl. Artif. Intell."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-5943-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:51:12Z","timestamp":1710348672000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-5943-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811659423","9789811659430"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-5943-0_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiyuan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.icpcsee.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"256","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}