{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T04:32:18Z","timestamp":1777437138460,"version":"3.51.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,1,16]],"date-time":"2019-01-16T00:00:00Z","timestamp":1547596800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61572095"],"award-info":[{"award-number":["61572095"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802097"],"award-info":[{"award-number":["61802097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20131277"],"award-info":[{"award-number":["BK20131277"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11036-018-1166-0","type":"journal-article","created":{"date-parts":[[2019,1,15]],"date-time":"2019-01-15T23:55:21Z","timestamp":1547596521000},"page":"1279-1294","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism"],"prefix":"10.1007","volume":"24","author":[{"given":"Jia","family":"Liu","sequence":"first","affiliation":[]},{"given":"Mingchu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Yuanfang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,16]]},"reference":[{"key":"1166_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.comcom.2015.10.012","volume":"82","author":"AA Ahmed","year":"2015","unstructured":"Ahmed AA, Jantan A, Wan TC (2015) Filtration model for the detection of malicious traffic in large-scale networks. Comput Commun 82:59\u201370","journal-title":"Comput Commun"},{"issue":"3\/4","key":"1166_CR2","first-page":"344","volume":"2","author":"B Al-Duwairi","year":"2012","unstructured":"Al-Duwairi B, Khater I, Al-Jarrah O (2012) Detecting image spam using image texture features. Int J Inf Secur Res (IJISR) 2(3\/4):344\u2013353","journal-title":"Int J Inf Secur Res (IJISR)"},{"key":"1166_CR3","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.ins.2016.07.075","volume":"379","author":"Y Chen","year":"2017","unstructured":"Chen Y, Crespi N, Ortiz AM, Shu L (2017) Reality mining: a prediction algorithm for disease dynamics based on mobile big data. Inform Sci 379:82\u201393","journal-title":"Inform Sci"},{"issue":"2","key":"1166_CR4","doi-asserted-by":"publisher","first-page":"215","DOI":"10.3390\/s16020215","volume":"16","author":"Y Chen","year":"2016","unstructured":"Chen Y, Lee GM, Lei S, Crespi N (2016) Industrial internet of things-based collaborative sensing intelligence: framework and research challenges. Sensors 16(2):215","journal-title":"Sensors"},{"key":"1166_CR5","doi-asserted-by":"crossref","unstructured":"Chen Y, Shu L, Crespi N, Lee GM, Guizani M (2016) Understanding the impact of network structure on propagation dynamics based on mobile big data, 1018\u20131023","DOI":"10.1109\/IWCMC.2016.7577198"},{"key":"1166_CR6","doi-asserted-by":"crossref","unstructured":"Fan Y, Ye Y, Chen L (2016) Malicious sequential pattern mining for automatic malware detection. Pergamon Press, Inc.","DOI":"10.1016\/j.eswa.2016.01.002"},{"issue":"1","key":"1166_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.eswa.2009.05.023","volume":"37","author":"YT Hou","year":"2010","unstructured":"Hou YT, Chang Y, Chen T, Laih CS, Chen CM (2010) Malicious web content detection by machine learning. Expert Syst Appl 37(1):55\u201360","journal-title":"Expert Syst Appl"},{"key":"1166_CR8","doi-asserted-by":"crossref","unstructured":"Huda S, Miah S, Yearwood J, Alyahya S, Al-Dossari H, Doss R (2018) A malicious threat detection model for cloud assisted internet of things (cot) based industrial control system (ics) networks using deep belief network. J Parallel Distrib Comput, 120","DOI":"10.1016\/j.jpdc.2018.04.005"},{"key":"1166_CR9","first-page":"25","volume":"2015","author":"G Jiang","year":"2015","unstructured":"Jiang G, Shen S, Hu K, Huang L, Li H, Han R (2015) Evolutionary game-based secrecy rate adaptation in wireless sensor networks. Int J Distrib Sensor Netw 2015:25","journal-title":"Int J Distrib Sensor Netw"},{"key":"1166_CR10","doi-asserted-by":"crossref","unstructured":"Jianzhong Z, Xu W, Yudi P, Xu Ji (2010) Mailtrust: a mail reputation mechanism based on improved trustguard. In: 2010 International conference on communications and mobile computing (CMC), vol 1. IEEE, pp 218\u2013222","DOI":"10.1109\/CMC.2010.133"},{"key":"1166_CR11","doi-asserted-by":"crossref","unstructured":"Kim S, Kim J, Kang BH (2018) Malicious url protection based on attackers\u2019 habitual behavioral analysis. Computers & Security","DOI":"10.1016\/j.cose.2018.01.013"},{"issue":"1","key":"1166_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-011-9277-z","volume":"40","author":"I Pinyol","year":"2013","unstructured":"Pinyol I, Sabater-Mir J (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1\u201325","journal-title":"Artif Intell Rev"},{"key":"1166_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.cose.2014.03.010","volume":"47","author":"Y Shen","year":"2014","unstructured":"Shen Y, Yan Z, Kantola R (2014) Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Comput Secur 47:3\u201325","journal-title":"Comput Secur"},{"key":"1166_CR14","unstructured":"Shu L, Chen Y, Sun Z, Tong F, et al. (2017) Detecting the dangerous area of toxic gases with wireless sensor networks. IEEE Transactions on Emerging Topics in Computing"},{"key":"1166_CR15","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.ins.2014.03.066","volume":"278","author":"K Singh","year":"2014","unstructured":"Singh K, Guntuku SC, Thakur A, Hota C (2014) Big data analytics framework for peer-to-peer botnet detection using random forests. Inform Sci 278:488\u2013497","journal-title":"Inform Sci"},{"key":"1166_CR16","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.cose.2013.03.014","volume":"38","author":"T Spyridopoulos","year":"2013","unstructured":"Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoretic defence framework against dos\/ddos cyber attacks. Comput Secur 38:39\u201350","journal-title":"Comput Secur"},{"issue":"1-4","key":"1166_CR17","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/COMST.2005.1593279","volume":"7","author":"V Srivastava","year":"2005","unstructured":"Srivastava V, Neel JO, MacKenzie AB, Menon R, DaSilva LA, Hicks JE, Reed JH, Gilles RP (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutor 7(1-4):46\u201356","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"1166_CR18","doi-asserted-by":"publisher","first-page":"026","DOI":"10.1103\/PhysRevE.85.026104","volume":"85","author":"A Szolnoki","year":"2012","unstructured":"Szolnoki A, Perc M (2012) Conditional strategies and the evolution of cooperation in spatial public goods games. Phys Rev E 85(2):026\u2013104","journal-title":"Phys Rev E"},{"key":"1166_CR19","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.comnet.2014.08.010","volume":"73","author":"C Tian","year":"2014","unstructured":"Tian C, Yang B, Zhong J, Liu X (2014) Trust-based incentive mechanism to motivate cooperation in hybrid p2p networks. Comput Netw 73:244\u2013255","journal-title":"Comput Netw"},{"issue":"17","key":"1166_CR20","doi-asserted-by":"publisher","first-page":"3811","DOI":"10.1016\/j.comnet.2011.07.011","volume":"55","author":"Y Wang","year":"2011","unstructured":"Wang Y, Nakao A, Vasilakos AV, Ma J (2011) On the effectiveness of service differentiation based resource-provision incentive mechanisms in dynamic and autonomous p2p networks. Comput Netw 55(17):3811\u20133831","journal-title":"Comput Netw"},{"key":"1166_CR21","unstructured":"Weibull JW (1997) Evolutionary game theory. MIT press"},{"key":"1166_CR22","doi-asserted-by":"crossref","unstructured":"Xu S, Li M, Chen Y, Shu L, Gu X (2013) A cooperation scheme based on reputation for opportunistic networks. In: International conference on computing, management and telecommunications, pp 289\u2013294","DOI":"10.1109\/ComManTel.2013.6482407"},{"key":"1166_CR23","unstructured":"Xu X, Wang Q, Cao J, Wan PJ (2012) Locating malicious nodes for data aggregation in wireless networks. In: IEEE INFOCOM, pp 3056\u20133060"},{"key":"1166_CR24","doi-asserted-by":"crossref","unstructured":"Yan Z, Kantola R, Shen Y (2011) Unwanted traffic control via global trust management. In: 10th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 647\u2013654","DOI":"10.1109\/TrustCom.2011.83"},{"key":"1166_CR25","doi-asserted-by":"crossref","unstructured":"Yan Z, Kantola R, Shen Y (2012) Unwanted traffic control via hybrid trust management. In: 11th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 666\u2013673","DOI":"10.1109\/TrustCom.2012.291"},{"issue":"1","key":"1166_CR26","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/13614568.2013.832807","volume":"20","author":"Z Yan","year":"2014","unstructured":"Yan Z, Kantola R, Shen Y (2014) A generic solution for unwanted traffic control through trust management. Rev Hypermed Multimed 20(1):25\u201351","journal-title":"Rev Hypermed Multimed"},{"issue":"6","key":"1166_CR27","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TDSC.2010.47","volume":"8","author":"Z Yan","year":"2011","unstructured":"Yan Z, Prehofer C (2011) Autonomic trust management for a component-based software system. IEEE Trans Depend Secur Comput 8(6):810\u2013823","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"1166_CR28","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ipl.2016.06.014","volume":"117","author":"Z Bo","year":"2017","unstructured":"Bo Z, Li Q, Ma Y (2017) Research on dynamic heuristic scanning technique and the application of the malicious code detection model. Inf Process Lett 117:19\u201324","journal-title":"Inf Process Lett"},{"issue":"2","key":"1166_CR29","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TNET.2011.2161770","volume":"20","author":"BQ Zhao","year":"2012","unstructured":"Zhao BQ, Lui JCS, Chiu D-M (2012) A mathematical framework for analyzing adaptive incentive protocols in p2p networks. IEEE\/ACM Trans Network 20(2):367\u2013380","journal-title":"IEEE\/ACM Trans Network"},{"issue":"1","key":"1166_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1416950.1416953","volume":"27","author":"E Zheleva","year":"2008","unstructured":"Zheleva E, Kolcz A, Getoor L (2008) Trusting spam reporters: a reporter-based reputation system for email filtering. ACM Trans Inf Syst (TOIS) 27(1):1\u201337","journal-title":"ACM Trans Inf Syst (TOIS)"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1166-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1166-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1166-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T19:24:09Z","timestamp":1579116249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1166-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,16]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1166"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1166-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,16]]},"assertion":[{"value":"16 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}