{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:23:33Z","timestamp":1763749413073,"version":"build-2065373602"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T00:00:00Z","timestamp":1738627200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T00:00:00Z","timestamp":1738627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11036-025-02443-y","type":"journal-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T03:18:15Z","timestamp":1738639095000},"page":"141-149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Game Model Based Intrusion Detection Method for Probability Distribution Attacks"],"prefix":"10.1007","volume":"30","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Dianyan","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yuanqing","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,4]]},"reference":[{"key":"2443_CR1","doi-asserted-by":"crossref","unstructured":"Manshaei M, Zhu Q, Alpcan T, Basar T, Hubaux J\u00a0P (2013) Game theory meets network security and privacy. ACM Comput Survey, vol 45, no 3, pp 25:1-25:39,","DOI":"10.1145\/2480741.2480742"},{"key":"2443_CR2","doi-asserted-by":"crossref","unstructured":"Liang X, Xiao Y (2013) Game theory for network security. IEEE Commun Survey Tutor, vol 15, no 1, pp 472-486,","DOI":"10.1109\/SURV.2012.062612.00056"},{"key":"2443_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.comnet.2014.06.008","volume":"71","author":"W Wang","year":"2014","unstructured":"Wang W, Chatterjee M, Kwiat K, Li Q (2014) A game theoretic approach to detect and co-exist with malicious nodes in wireless networks. Comput Netw 71:63\u201383","journal-title":"Comput Netw"},{"key":"2443_CR4","doi-asserted-by":"crossref","unstructured":"Zhang L, Zhu T, Hussain F\u00a0K, Ye D, Zhou W (2023) A game-theoretic method for defending against advanced persistent threats in cyber systems. IEEE Trans Inf Foren Secur, vol 18, pp 1349-1364,","DOI":"10.1109\/TIFS.2022.3229595"},{"key":"2443_CR5","doi-asserted-by":"crossref","unstructured":"Gill K\u00a0S, Saxena S, Sharma A (2024) NCGTM: A noncooperative game-theoretic model to assist IDS in cloud environment. IEEE Trans Indust Inf, vol 20, no 3, pp 3124-3132,","DOI":"10.1109\/TII.2023.3300452"},{"key":"2443_CR6","doi-asserted-by":"crossref","unstructured":"Ismail Z, Leneutre J, Bateman D, Chen L (2014) A game theoretical analysis of data confidentiality attacks on smart-grid AMI. IEEE J Select Area Commun, vol 32, no 7, pp 1486-1499,","DOI":"10.1109\/JSAC.2014.2332095"},{"key":"2443_CR7","doi-asserted-by":"crossref","unstructured":"Wu H, Wang Z (2018) Multi-source fusion-based security detection method for heterogeneous networks. Comput Secur, vol 74, pp 55-70,","DOI":"10.1016\/j.cose.2018.01.003"},{"key":"2443_CR8","doi-asserted-by":"crossref","unstructured":"Wu H, Wang W (2018) A game theory based collaborative security detection method for internet of things systems. IEEE Trans Inf Foren Secur, vol 16, no 3, pp 1432-1445,","DOI":"10.1109\/TIFS.2018.2790382"},{"key":"2443_CR9","doi-asserted-by":"crossref","unstructured":"Gill K\u00a0S, Saxena S, Sharma A (2024) NCGTM: a noncooperative game-theoretic model to assist IDS in cloud environment. IEEE Trans Indust Inf, vol 20, no 3, pp 3124-3132,","DOI":"10.1109\/TII.2023.3300452"},{"key":"2443_CR10","doi-asserted-by":"crossref","unstructured":"Toko T\u00a0M\u00a0N, Bellaiche M, Halabi T (2024) A game-theoretic approach for DDoS attack mitigation in IIoT deterministic networking. 2024 IEEE\/IFIP Netw Operate Manage Symp,","DOI":"10.1109\/NOMS59830.2024.10575184"},{"key":"2443_CR11","doi-asserted-by":"crossref","unstructured":"R.\u00a0R.\u00a0R.\u00a0Barbosa, R.\u00a0Sadre and A.\u00a0Pras, Towards periodicity based anomaly detection in SCADA networks. IEEE Emerging Technologies and Factory Automation, 2012","DOI":"10.1109\/ETFA.2012.6489745"},{"key":"2443_CR12","unstructured":"Grewal M, Andrews A (1993) Kalman filtering: theory and practice. Prentice-Hall,"},{"key":"2443_CR13","doi-asserted-by":"crossref","unstructured":"Shalini P\u00a0V, Sanjeevi S\u00a0G, Radha V (2022) DOCUS-DDoS detection in SDN using modified CUSUM with flash traffic discrimination and mitigation. Comput Netw, vol 217, no 9, pp 1-16,","DOI":"10.1016\/j.comnet.2022.109361"},{"key":"2443_CR14","doi-asserted-by":"crossref","unstructured":"Callegari C, Giordano S, Pagano M, Pepe T (2012) DOWAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis. Comput Secur, vol 31, no 5, pp 727-735,","DOI":"10.1016\/j.cose.2012.05.001"},{"key":"2443_CR15","doi-asserted-by":"crossref","unstructured":"Apruzzese G, Marchetti M, Colajanni M, Zoccoli G\u00a0G, Guido A (2017) Identifying malicious hosts involved in periodic communications. IEEE Int Symp Netw Comput Appl,","DOI":"10.1109\/NCA.2017.8171326"},{"key":"2443_CR16","doi-asserted-by":"crossref","unstructured":"Vukovic O, Dan G (2014) Security of fully distributed power system state estimation: detection and mitigation of date integrity attacks. IEEE J Select Area Commun, vol 32, no 7, pp 1500-1508,","DOI":"10.1109\/JSAC.2014.2332106"},{"key":"2443_CR17","doi-asserted-by":"crossref","unstructured":"Chattopadhyay A, Mitra U (2020) Security against false data-injection attack in cyber-physical systems. IEEE Trans Contr Netw Syst, vol 7, no 2, pp 1015-1027,","DOI":"10.1109\/TCNS.2019.2927594"},{"key":"2443_CR18","doi-asserted-by":"crossref","unstructured":"Yang J, Zhang W, Guo F (2022) Distributed Kalman-like filtering and bad data detection in the large-scale power system. IEEE Trans Indust Inf, vol 18, no 8, pp 5096-5104,","DOI":"10.1109\/TII.2021.3119136"},{"key":"2443_CR19","doi-asserted-by":"crossref","unstructured":"Li L, Yang H, Xia Y, Zhu C (2021) Attack detection and distributed filtering for state-saturated systems under deception attack. IEEE Trans Contr Netw Syst, vol 8, no 4, pp 1918-1929,","DOI":"10.1109\/TCNS.2021.3089146"},{"key":"2443_CR20","doi-asserted-by":"publisher","unstructured":"Liu S, Luo Z, Fu W. Fcdnet: Fuzzy Cognition-based Dynamic Fusion Network for Multimodal Sentiment Analysis. IEEE Trans Fuzzy Syst, online first, https:\/\/doi.org\/10.1109\/TFUZZ.2024.3407739","DOI":"10.1109\/TFUZZ.2024.3407739"},{"key":"2443_CR21","doi-asserted-by":"crossref","unstructured":"Huang S, Fu W, Zhang Z, Liu S (2024) Global-local fusion based on adversarial sample generation for image-text matching. Inf Fusion 103:102084","DOI":"10.1016\/j.inffus.2023.102084"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02443-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-025-02443-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02443-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T01:43:00Z","timestamp":1760492580000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-025-02443-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,4]]},"references-count":21,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["2443"],"URL":"https:\/\/doi.org\/10.1007\/s11036-025-02443-y","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2025,2,4]]},"assertion":[{"value":"13 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}