{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:32:15Z","timestamp":1774020735937,"version":"3.50.1"},"reference-count":123,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Dyn Games Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s13235-018-00291-y","type":"journal-article","created":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T01:59:24Z","timestamp":1546307964000},"page":"884-913","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["Dynamic Games in Cyber-Physical Security: An Overview"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2087-6136","authenticated-orcid":false,"given":"S. Rasoul","family":"Etesami","sequence":"first","affiliation":[]},{"given":"Tamer","family":"Ba\u015far","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,1]]},"reference":[{"key":"291_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti A, Dingledine R, Syverson P (2003) On the economics of anonymity. In: International conference on financial cryptography. Springer, pp 84\u2013102","DOI":"10.1007\/978-3-540-45126-6_7"},{"key":"291_CR2","doi-asserted-by":"crossref","first-page":"4331","DOI":"10.1109\/TIT.2015.2445344","volume":"IT\u201361","author":"E Akyol","year":"2015","unstructured":"Akyol E, Rose K, Ba\u015far T (2015) Optimal zero-delay jamming over an additive noise channel. IEEE Trans Inf Theory IT\u201361:4331\u20134344","journal-title":"IEEE Trans Inf Theory"},{"key":"291_CR3","doi-asserted-by":"crossref","unstructured":"Akyol E, Rose K, Ba\u015far T (2013) On communication over Gaussian sensor networks with adversaries: further results. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 1\u20139","DOI":"10.1007\/978-3-319-02786-9_1"},{"key":"291_CR4","volume-title":"Network security: a decision and game theoretic approach","author":"T Alpcan","year":"2011","unstructured":"Alpcan T, Ba\u015far T (2011) Network security: a decision and game theoretic approach. Cambridge University Press, Cambridge"},{"key":"291_CR5","doi-asserted-by":"crossref","unstructured":"Alpcan T, Ba\u015far T (2004) A game theoretic analysis of intrusion detection in access control systems. In: 43rd IEEE conference on decision and control (CDC), vol 2, pp 1568\u20131573","DOI":"10.1109\/CDC.2004.1430267"},{"key":"291_CR6","unstructured":"Alpcan T, Ba\u015far T (2006) An intrusion detection game with limited observations. In: 12th international symposium on dynamic games and applications, vol 26. Sophia Antipolis, France"},{"key":"291_CR7","doi-asserted-by":"crossref","unstructured":"Alpern S, Lidbetter T, Morton A, Papadaki K (2016) Patrolling a pipeline. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 129\u2013138","DOI":"10.1007\/978-3-319-47413-7_8"},{"issue":"1","key":"291_CR8","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MNET.2013.6423187","volume":"27","author":"S Amin","year":"2013","unstructured":"Amin S, Schwartz GA, Hussain A (2013) In quest of benchmarking security risks to cyber-physical systems. IEEE Netw 27(1):19\u201324","journal-title":"IEEE Netw"},{"key":"291_CR9","unstructured":"An B, Brown M, Vorobeychik Y, Tambe M (2013) Security games with surveillance cost and optimal timing of attack execution In: Proceedings of the 2013 international conference on autonomous agents and multi-agent systems, pp 223\u2013230"},{"key":"291_CR10","doi-asserted-by":"crossref","unstructured":"Anderson R, Moore T, Nagaraja S, Ozment A (2007) Incentives and information security. Algorithmic Game Theory, pp 633\u2013649","DOI":"10.1017\/CBO9780511800481.027"},{"key":"291_CR11","unstructured":"Balcan M-F, Blum A, Haghtalab N, Procaccia AD (2015) Commitment without regrets: online learning in Stackelberg security games. In: Proceedings of the sixteenth ACM conference on economics and computation, pp 61\u201378"},{"issue":"4","key":"291_CR12","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1007\/s10796-012-9373-x","volume":"16","author":"T Bandyopadhyay","year":"2014","unstructured":"Bandyopadhyay T, Liu D, Mookerjee VS, Wilhite AW (2014) Dynamic competition in IT security: a differential games approach. Inf Syst Front 16(4):643\u2013661","journal-title":"Inf Syst Front"},{"issue":"3","key":"291_CR13","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/BF00941822","volume":"61","author":"R Bansal","year":"1989","unstructured":"Bansal R, Ba\u015far T (1989) Communication games with partially soft power constraints. J Optim Theory Appl 61(3):329\u2013346","journal-title":"J Optim Theory Appl"},{"key":"291_CR14","doi-asserted-by":"crossref","unstructured":"Basak A, Fang F, Nguyen TH, Kiekintveld C (2016) Combining graph contraction and strategy generation for green security games. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 251\u2013271","DOI":"10.1007\/978-3-319-47413-7_15"},{"issue":"1","key":"291_CR15","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/TIT.1983.1056602","volume":"IT\u201329","author":"T Ba\u015far","year":"1983","unstructured":"Ba\u015far T (1983) The Gaussian test channel with an intelligent jammer. IEEE Trans Inf Theory IT\u201329(1):152\u2013157","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"291_CR16","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1080\/17442508208833239","volume":"8","author":"T\u00dc Ba\u015far","year":"1982","unstructured":"Ba\u015far T\u00dc, Ba\u015far T (1982) Optimum coding and decoding schemes for the transmission of a stochastic process over a continuous-time stochastic channel with partially unknown statistics. Stochastics 8(3):213\u2013237","journal-title":"Stochastics"},{"issue":"2","key":"291_CR17","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0016-0032(84)90034-6","volume":"317","author":"T Ba\u015far","year":"1984","unstructured":"Ba\u015far T, Ba\u015far T\u00dc (1984) A bandwidth expanding scheme for communication channels with noiseless feedback and in the presence of unknown jamming noise. J Frankl Inst 317(2):73\u201388","journal-title":"J Frankl Inst"},{"issue":"1","key":"291_CR18","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/18.42196","volume":"35","author":"T\u00dc Ba\u015far","year":"1989","unstructured":"Ba\u015far T\u00dc, Ba\u015far T (1989) Optimum linear causal coding schemes for Gaussian stochastic processes in the presence of correlated jamming. IEEE Trans Inf Theory 35(1):199\u2013202","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"291_CR19","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/TIT.1985.1057076","volume":"IT\u201331","author":"T Ba\u015far","year":"1985","unstructured":"Ba\u015far T, Wu YW (1985) A complete characterization of minimax and maximin encoder-decoder policies for communication channels with incomplete statistical description. IEEE Trans Inf Theory IT\u201331(4):482\u2013489","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"291_CR20","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/BF00940281","volume":"51","author":"T Ba\u015far","year":"1986","unstructured":"Ba\u015far T, Wu YW (1986) Solutions to a class of minimax decision problems arising in communication systems. J Optim Theory Appl 51(3):375\u2013404","journal-title":"J Optim Theory Appl"},{"key":"291_CR21","doi-asserted-by":"crossref","unstructured":"Ba\u015far T, Olsder GJ (1999) Dynamic noncooperative game theory. Series in classics in applied mathematics, SIAM, Philadelphia","DOI":"10.1137\/1.9781611971132"},{"key":"291_CR22","doi-asserted-by":"crossref","unstructured":"Behrens DA, Caulkins JP, Feichtinger G, Tragler G (2007) Incentive Stackelberg strategies for a dynamic game on terrorism. Adv Dyn Game Theory, pp 459\u2013486","DOI":"10.1007\/978-0-8176-4553-3_23"},{"key":"291_CR23","first-page":"135","volume-title":"Lecture Notes in Computer Science","author":"Alain Bensoussan","year":"2010","unstructured":"Bensoussan A, Kantarcioglu M, Hoe S (2010) A game-theoretical approach for finding optimal strategies in a Botnet defense model. In: Proceedings of international conference on decision and game theory for security (GameSec), pp 135\u2013148"},{"issue":"1","key":"291_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3934\/naco.2013.3.1","volume":"3","author":"S Bhattacharya","year":"2013","unstructured":"Bhattacharya S, Gupta A, Ba\u015far T (2013) Jamming in mobile networks: a game-theoretic approach. J. Numer Algebra Control Optim 3(1):1\u201330","journal-title":"J. Numer Algebra Control Optim"},{"key":"291_CR25","doi-asserted-by":"crossref","unstructured":"Bhattacharya S, Ba\u015far T (2010) Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In: American control conference (ACC). IEEE, pp 818\u2013823","DOI":"10.1109\/ACC.2010.5530755"},{"key":"291_CR26","doi-asserted-by":"crossref","unstructured":"Bhattacharya S, Ba\u015far T (2011) Spatial approaches to broadband jamming in heterogeneous mobile networks: a game-theoretic approach. J Autonomous Robots","DOI":"10.1007\/s10514-011-9253-0"},{"key":"291_CR27","doi-asserted-by":"crossref","unstructured":"Bloem M, Alpcan T, Ba\u015far T (2006) Intrusion response as a resource allocation problem. In: 45th IEEE conference on decision and control, pp 6283\u20136288","DOI":"10.1109\/CDC.2006.376981"},{"issue":"02","key":"291_CR28","first-page":"81","volume":"7","author":"R B\u00f6hme","year":"2016","unstructured":"B\u00f6hme R, Moore T (2016) The \u201citerated weakest link\u201d model of adaptive security investment. J Inf Secur 7(02):81","journal-title":"J Inf Secur"},{"key":"291_CR29","doi-asserted-by":"crossref","unstructured":"Bommannavar P, Alpcan T, Bambos N (2011) Security risk management via dynamic games with learning. In: IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/icc.2011.5963330"},{"issue":"10","key":"291_CR30","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1002\/sec.242","volume":"4","author":"TE Carroll","year":"2011","unstructured":"Carroll TE, Grosu D (2011) A game theoretic investigation of deception in network security. Secur Commun Netw 4(10):1162\u20131172","journal-title":"Secur Commun Netw"},{"key":"291_CR31","doi-asserted-by":"crossref","unstructured":"Casey W, Morales JA, Nguyen T, Spring J, Weaver R, Wright E, Metcalf L, Mishra B (2014) Cyber security via signaling games: toward a science of cyber security. In: International conference on distributed computing and internet technology. Springer, pp 34\u201342","DOI":"10.1007\/978-3-319-04483-5_4"},{"key":"291_CR32","unstructured":"Casey W, Weaver R, Metcalf L, Morales JA, Wright E, Mishra B (2014) Cyber security via minority games with epistatic signaling. In: Proceedings of the 8th international conference on bioinspired information and communications technologies, pp 133\u2013140"},{"key":"291_CR33","doi-asserted-by":"crossref","unstructured":"Cavallo R (2008) Efficiency and redistribution in dynamic mechanism design. In: Proceedings of the 9th ACM conference on electronic commerce, pp 220\u2013229","DOI":"10.1145\/1386790.1386826"},{"key":"291_CR34","doi-asserted-by":"crossref","unstructured":"\u00c7eker H, Zhuang J, Upadhyaya S, La QD, Soong B-H (2016) Deception-based game theoretical approach to mitigate DoS attacks. In: International conference on decision and game theory for security. Springer, pp 18\u201338","DOI":"10.1007\/978-3-319-47413-7_2"},{"key":"291_CR35","doi-asserted-by":"crossref","unstructured":"Chen J, Zhu Q (2016) Optimal contract design under asymmetric information for cloud-enabled internet of controlled things. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 329\u2013348","DOI":"10.1007\/978-3-319-47413-7_19"},{"key":"291_CR36","doi-asserted-by":"crossref","unstructured":"Chicoisne R, Ord\u00f3\u00f1ez F (2016) Risk averse Stackelberg security games with quantal response. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 83\u2013100","DOI":"10.1007\/978-3-319-47413-7_5"},{"key":"291_CR37","doi-asserted-by":"crossref","unstructured":"Chung K, Kamhoua CA, Kwiat KA, Kalbarczyk ZT, Iyer RK (2016) Game theory with learning for cyber security monitoring. In: 17th IEEE international symposium on high assurance systems engineering (HASE), pp 1\u20138","DOI":"10.1109\/HASE.2016.48"},{"key":"291_CR38","doi-asserted-by":"crossref","unstructured":"Culnane C, Teague V (2016) Strategies for voter-initiated election audits. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 235\u2013247","DOI":"10.1007\/978-3-319-47413-7_14"},{"key":"291_CR39","doi-asserted-by":"crossref","unstructured":"Dziubi\u0144ski M, Sankowski P, Zhang Q (2016) Network elicitation in adversarial environment. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 397\u2013414","DOI":"10.1007\/978-3-319-47413-7_23"},{"key":"291_CR40","unstructured":"Fang F, Stone P, Tambe M (2015) When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: IJCAI, pp 2589\u20132595"},{"key":"291_CR41","unstructured":"Fang H, Xu L, Wang X (2017) Coordinated multiple-relays based physical-layer security improvement: a single-leader multiple-followers Stackelberg game scheme. In: IEEE transactions on information forensics and security, pp 75\u201380"},{"key":"291_CR42","doi-asserted-by":"crossref","unstructured":"Farhadi F, Tavafoghi H, Teneketzis D, Golestani J (2017) A dynamic incentive mechanism for security in networks of interdependent agents. In: 7th EAI international conference on game theory for networks","DOI":"10.1007\/978-3-319-67540-4_8"},{"key":"291_CR43","doi-asserted-by":"crossref","unstructured":"Farhang S, Grossklags J (2016) Flipleakage: a game-theoretic approach to protect against stealthy attackers in the presence of information leakage. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 195\u2013214","DOI":"10.1007\/978-3-319-47413-7_12"},{"key":"291_CR44","doi-asserted-by":"crossref","unstructured":"Farhang S, Manshaei MH, Esfahani MN, Zhu Q (2014) A dynamic Bayesian security game framework for strategic defense mechanism design. In: International conference on decision and game theory for security. Springer, pp 319\u2013328","DOI":"10.1007\/978-3-319-12601-2_18"},{"key":"291_CR45","doi-asserted-by":"crossref","unstructured":"Ghafouri A, Abbas W, Laszka A, Vorobeychik Y, Koutsoukos X (2016) Optimal thresholds for anomaly-based intrusion detection in dynamical environments. In: International conference on decision and game theory for security. Springer, pp 415\u2013434","DOI":"10.1007\/978-3-319-47413-7_24"},{"key":"291_CR46","unstructured":"Gibson AS (2013) Applied hypergame theory for network defense. Air Force Inst of Tech WRIGHT-PATTERSON AFB OH Graduate School of Engineering Management. Tech. Rep"},{"key":"291_CR47","doi-asserted-by":"crossref","unstructured":"Gravin N, Peres Y, Sivan B (2016) Towards optimal algorithms for prediction with expert advice. In: Proceedings of the twenty-seventh annual ACM-SIAM symposium on discrete algorithms, pp 528\u2013547","DOI":"10.1137\/1.9781611974331.ch39"},{"issue":"1","key":"291_CR48","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/TCNS.2016.2584183","volume":"4","author":"A Gupta","year":"2017","unstructured":"Gupta A, Langbort C, Ba\u015far T (2017) Dynamic games with asymmetric information and resource constrained players with applications to security of cyberphysical systems. IEEE Trans Control Netw Syst 4(1):71\u201381","journal-title":"IEEE Trans Control Netw Syst"},{"key":"291_CR49","doi-asserted-by":"crossref","unstructured":"Gupta A, Langbort C, Ba\u015far T (2010) Optimal control in the presence of an intelligent jammer with limited actions. In: 49th IEEE conference on decision and control (CDC), pp 1096\u20131101","DOI":"10.1109\/CDC.2010.5717544"},{"key":"291_CR50","doi-asserted-by":"crossref","unstructured":"Gupta A, Schwartz G, Langbort C, Sastry SS, Ba\u015far T (2014) A three-stage Colonel Blotto game with applications to cyber-physical security. In: Proceedings of IEEE American control conference (ACC), pp 3820\u20133825","DOI":"10.21236\/ADA604916"},{"key":"291_CR51","doi-asserted-by":"crossref","unstructured":"He X, Dai H, Ning P (2015) Improving learning and adaptation in security games by exploiting information asymmetry. In: IEEE conference on computer communications (INFOCOM), pp 1787\u20131795","DOI":"10.1109\/INFOCOM.2015.7218560"},{"key":"291_CR52","doi-asserted-by":"crossref","unstructured":"Hor\u00e1k K, Bo\u0161ansk\u1ef3 B (2016) A point-based approximate algorithm for one-sided partially observable pursuit-evasion games. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 435\u2013454","DOI":"10.1007\/978-3-319-47413-7_25"},{"key":"291_CR53","first-page":"766604","volume":"7666","author":"JT House","year":"2010","unstructured":"House JT, Cybenko G (2010) Hypergame theory applied to cyber attack and defense. Sens Command Control Commun Intell (C3I) Technol Homel Secur Homel Def IX 7666:766604\u2013766611","journal-title":"Sens Command Control Commun Intell (C3I) Technol Homel Secur Homel Def IX"},{"key":"291_CR54","unstructured":"Jiang AX, Yin Z, Zhang C, Tambe M, Kraus S (2013) Game-theoretic randomization for security patrolling with dynamic execution uncertainty. In: Proceedings of the 2013 international conference on autonomous agents and multi-agent systems, pp 207\u2013214"},{"issue":"2","key":"291_CR55","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1109\/TNET.2010.2071397","volume":"19","author":"L Jiang","year":"2011","unstructured":"Jiang L, Anantharam V, Walrand J (2011) How bad are selfish investments in network security? IEEE\/ACM Trans Netw 19(2):549\u2013560","journal-title":"IEEE\/ACM Trans Netw"},{"key":"291_CR56","unstructured":"Jones MG (2013) Asymmetric information games and cyber security. Ph.D. dissertation, Georgia Institute of Technology"},{"key":"291_CR57","doi-asserted-by":"crossref","first-page":"263","DOI":"10.2307\/1914185","volume":"47","author":"D Kahneman","year":"1979","unstructured":"Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision under risk. Econometrica 47:263\u2013291","journal-title":"Econometrica"},{"key":"291_CR58","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.artint.2016.08.002","volume":"240","author":"D Kar","year":"2016","unstructured":"Kar D, Fang F, Delle Fave FM, Sintov N, Tambe M, Lyet A (2016) Comparing human behavior models in repeated Stackelberg security games: an extended study. Artif Intell 240:65\u2013103","journal-title":"Artif Intell"},{"key":"291_CR59","unstructured":"Kar D, Fang F, Delle Fave F, Sintov N, Tambe M (2015) A game of thrones: when human behavior models compete in repeated Stackelberg security games. In: Proceedings of the 2015 international conference on autonomous agents and multiagent systems, pp 1381\u20131390"},{"issue":"1","key":"291_CR60","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/JSAC.2012.120104","volume":"30","author":"M Khouzani","year":"2012","unstructured":"Khouzani M, Sarkar S, Altman E (2012) Saddle-point strategies in malware attack. IEEE J Sel Areas Commun 30(1):31\u201343","journal-title":"IEEE J Sel Areas Commun"},{"key":"291_CR61","unstructured":"Kiekintveld C, Jain M, Tsai J, Pita J, Ord\u00f3\u00f1ez F, Tambe M (2009) Computing optimal randomized resource allocations for massive security games. In: Proceedings of the 8th international conference on autonomous agents and multiagent systems, vol 1, pp 689\u2013696"},{"key":"291_CR62","unstructured":"La QD, Quek TQ, Lee J (2016) A game theoretic model for enabling honeypots in IoT networks. In: IEEE international conference on communications (ICC), pp 1\u20136"},{"key":"291_CR63","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/B978-0-444-53766-9.00002-1","volume":"4","author":"R Laraki","year":"2015","unstructured":"Laraki R, Sorin S (2015) Advances in zero-sum dynamic games. Handbook of game theory with economic applications 4:27\u201393","journal-title":"Handbook of game theory with economic applications"},{"issue":"1","key":"291_CR64","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TPWRS.2014.2326403","volume":"30","author":"YW Law","year":"2015","unstructured":"Law YW, Alpcan T, Palaniswami M (2015) Security games for risk minimization in automatic generation control. IEEE Trans Power Syst 30(1):223\u2013232","journal-title":"IEEE Trans Power Syst"},{"issue":"10","key":"291_CR65","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1109\/TAC.2015.2461851","volume":"60","author":"Y Li","year":"2015","unstructured":"Li Y, Shi L, Cheng P, Chen J, Quevedo DE (2015) Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans Autom Control 60(10):2831\u20132836","journal-title":"IEEE Trans Autom Control"},{"issue":"1","key":"291_CR66","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1109\/SURV.2012.062612.00056","volume":"15","author":"X Liang","year":"2013","unstructured":"Liang X, Xiao Y (2013) Game theory for network security. IEEE Commun Surv Tutor 15(1):472\u2013486","journal-title":"IEEE Commun Surv Tutor"},{"key":"291_CR67","unstructured":"Li H, Lai L, Qiu RC (2011) A denial-of-service jamming game for remote state monitoring in smart grid. In: 45th annual conference on information sciences and systems (CISS). IEEE, pp 1\u20136"},{"key":"291_CR68","unstructured":"Li L, Langbort C, Shamma J (2017) Computing security strategies in finite horizon repeated bayesian games. In: American control conference (ACC), pp 3664\u20133669"},{"key":"291_CR69","doi-asserted-by":"crossref","unstructured":"Lin J, Liu P, Jing J (2012) Using signaling games to model the multi-step attack-defense scenarios on confidentiality. In: Proceedings of conference on decision and game theory for security (GameSec). Springer, pp 118\u2013137","DOI":"10.1007\/978-3-642-34266-0_7"},{"issue":"1","key":"291_CR70","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1053283.1053288","volume":"8","author":"P Liu","year":"2005","unstructured":"Liu P, Zang W, Yu M (2005) Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans Inf Syst Secur (TISSEC) 8(1):78\u2013118","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"291_CR71","doi-asserted-by":"crossref","unstructured":"Liu Y, Comaniciu C, Man H (2006) A Bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceedings of the 2006 workshop on game theory for communications and networks. ACM, p 4","DOI":"10.1145\/1190195.1190198"},{"key":"291_CR72","doi-asserted-by":"crossref","unstructured":"Luo Y, Szidarovszky F, Al-Nashif Y, Hariri S (2010) Game theory based network security. Executive Editor in Chief","DOI":"10.4236\/jis.2010.11005"},{"issue":"1\u20132","key":"291_CR73","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s10207-004-0060-x","volume":"4","author":"K-W Lye","year":"2005","unstructured":"Lye K-W, Wing JM (2005) Game strategies in network security. Int J Inf Secur 4(1\u20132):71\u201386","journal-title":"Int J Inf Secur"},{"issue":"5","key":"291_CR74","doi-asserted-by":"crossref","first-page":"2273","DOI":"10.1109\/TSG.2015.2400215","volume":"6","author":"J Ma","year":"2015","unstructured":"Ma J, Liu Y, Song L, Han Z (2015) Multiact dynamic game strategy for jamming attack in electricity market. IEEE Trans Smart Grid 6(5):2273\u20132282","journal-title":"IEEE Trans Smart Grid"},{"issue":"8","key":"291_CR75","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1109\/26.864173","volume":"48","author":"RK Mallik","year":"2000","unstructured":"Mallik RK, Scholtz RA, Papavassilopoulos GP (2000) Analysis of an on\u2013off jamming situation as a dynamic game. IEEE Trans Commun 48(8):1360\u20131373","journal-title":"IEEE Trans Commun"},{"issue":"3","key":"291_CR76","doi-asserted-by":"crossref","first-page":"25:1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei MH, Zhu Q, Alpcan T, Ba\u015far T, Hubaux J-P (2013) Game theory meets network security and privacy. ACM Comput Surv (CSUR) 45(3):25:1\u201325:39","journal-title":"ACM Comput Surv (CSUR)"},{"key":"291_CR77","doi-asserted-by":"crossref","unstructured":"Miao F, Pajic M, Pappas GJ (2013) Stochastic game approach for replay attack detection. In: IEEE 52nd annual conference on decision and control (CDC), pp 1854\u20131859","DOI":"10.1109\/CDC.2013.6760152"},{"key":"291_CR78","doi-asserted-by":"crossref","unstructured":"Miura-Ko RA, Yolken B, Bambos N, Mitchell J (2008) Security investment games of interdependent organizations. In: 46th annual Allerton conference on communication, control, and computing. IEEE, pp 252\u2013260","DOI":"10.1109\/ALLERTON.2008.4797564"},{"key":"291_CR79","doi-asserted-by":"crossref","unstructured":"Mohammadi A, Manshaei MH, Moghaddam MM, Zhu Q (2016) A game-theoretic analysis of deception over social networks using fake avatars. In: International conference on decision and game theory for security. Springer, pp 382\u2013394","DOI":"10.1007\/978-3-319-47413-7_22"},{"issue":"1","key":"291_CR80","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/TSP.2012.2222386","volume":"61","author":"A Mukherjee","year":"2013","unstructured":"Mukherjee A, Swindlehurst AL (2013) Jamming games in the mimo wiretap channel with an active eavesdropper. IEEE Trans Sig Process 61(1):82\u201391","journal-title":"IEEE Trans Sig Process"},{"key":"291_CR81","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay A, Zhang C, Vorobeychik Y, Tambe M, Pence K, Speer P (2016) Optimal allocation of police patrol resources using a continuous-time crime model. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 139\u2013158","DOI":"10.1007\/978-3-319-47413-7_9"},{"key":"291_CR82","doi-asserted-by":"crossref","unstructured":"Nadendla VSS, Akyol E, Langbort C, Ba\u015far T (2017) Strategic communication between prospect theoretic agents over a Gaussian test channel. In: Proceedings of MILCOM 2017, Baltimore, MD, Oct 23\u201325 (to appear)","DOI":"10.1109\/MILCOM.2017.8170821"},{"key":"291_CR83","doi-asserted-by":"crossref","unstructured":"Naghizadeh P, Liu M (2016) Inter-temporal incentives in security information sharing agreements. In: Information theory and applications workshop (ITA). IEEE, pp 1\u20138","DOI":"10.1109\/ITA.2016.7888179"},{"key":"291_CR84","unstructured":"Nguyen KC, Alpcan T, Ba\u015far T (2008) Fictitious play with imperfect observations for network intrusion detection. Preprints of the 13th international symposium dynamic games and applications (ISDGA), June 30\u2013July 3, Wroclaw, Poland"},{"key":"291_CR85","doi-asserted-by":"crossref","unstructured":"Nguyen KC, Alpcan T, Ba\u015far T (2009) Security games with incomplete information. In: IEEE international conference on communications, ICC\u201909, pp 1\u20136","DOI":"10.1109\/ICC.2009.5199443"},{"key":"291_CR86","doi-asserted-by":"crossref","unstructured":"Nguyen KC, Alpcan T, Ba\u015far T (2009) Stochastic games for security in networks with interdependent nodes. In: International conference on game theory for networks. IEEE, pp 697\u2013703","DOI":"10.1109\/GAMENETS.2009.5137463"},{"key":"291_CR87","doi-asserted-by":"crossref","unstructured":"Nguyen TH, Yadav A, An B, Tambe M, Boutilier C (2014) Regret-based optimization and preference elicitation for Stackelberg security games with uncertainty. In: AAAI, pp 756\u2013762","DOI":"10.1609\/aaai.v28i1.8804"},{"key":"291_CR88","doi-asserted-by":"crossref","unstructured":"Noureddine MA, Fawaz A, Sanders WH, Ba\u015far T (2016) A game-theoretic approach to respond to attacker lateral movement. In: International conference on decision and game theory for security. Springer, pp 294\u2013313","DOI":"10.1007\/978-3-319-47413-7_17"},{"issue":"1","key":"291_CR89","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TAC.2016.2544936","volume":"62","author":"Y Ouyang","year":"2017","unstructured":"Ouyang Y, Tavafoghi H, Teneketzis D (2017) Dynamic games with asymmetric information: common information based perfect bayesian equilibria and sequential decomposition. IEEE Trans Autom Control 62(1):222\u2013237","journal-title":"IEEE Trans Autom Control"},{"issue":"2","key":"291_CR90","first-page":"131","volume":"2","author":"A Patcha","year":"2006","unstructured":"Patcha A, Park J-M (2006) A game theoretic formulation for intrusion detection in mobile ad hoc networks. IJ Netw Secur 2(2):131\u2013137","journal-title":"IJ Netw Secur"},{"key":"291_CR91","unstructured":"Pawlick J, Zhu Q (2015) Deception by design: evidence-based signaling games for network defense. arXiv preprint arXiv:1503.05458"},{"key":"291_CR92","doi-asserted-by":"crossref","unstructured":"Pita J, Tambe M, Kiekintveld C, Cullen S, Steigerwald E (2011) GUARDS: game theoretic security allocation on a national scale. In: The 10th international conference on autonomous agents and multiagent systems, vol 1, pp 37\u201344","DOI":"10.1017\/CBO9780511973031.006"},{"key":"291_CR93","unstructured":"Ramachandran K, Stefanova Z (2016) Dynamic game theories in cyber security. In: Proceedings of dynamic systems and applications, pp 1\u20138"},{"key":"291_CR94","doi-asserted-by":"crossref","unstructured":"Raya M, Manshaei MH, F\u00e9legyh\u00e1zi M, Hubaux J-P (2008) Revocation games in ephemeral networks. In: Proceedings of the 15th ACM conference on computer and communications security, pp 199\u2013210","DOI":"10.1145\/1455770.1455797"},{"key":"291_CR95","doi-asserted-by":"crossref","unstructured":"Raya M, Shokri R, Hubaux J-P (2010) \u201cOn the tradeoff between trust and privacy in wireless ad hoc networks. In: Proceedings of the third ACM conference on wireless network security, pp 75\u201380","DOI":"10.1145\/1741866.1741879"},{"key":"291_CR96","doi-asserted-by":"crossref","unstructured":"Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q (2010) A survey of game theory as applied to network security. In: 43rd Hawaii international conference on system sciences (HICSS). IEEE, pp 1\u201310","DOI":"10.1109\/HICSS.2010.35"},{"issue":"11","key":"291_CR97","doi-asserted-by":"crossref","first-page":"3980","DOI":"10.1109\/TWC.2012.091812.111923","volume":"11","author":"W Saad","year":"2012","unstructured":"Saad W, Zhou X, Maham B, Ba\u015far T, Poor HV (2012) Tree formation with physical layer security considerations in wireless multi-hop networks. IEEE Trans Wirel Commun 11(11):3980\u20133991","journal-title":"IEEE Trans Wirel Commun"},{"issue":"8","key":"291_CR98","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MCOM.2011.5978424","volume":"49","author":"Yalin Sagduyu","year":"2011","unstructured":"Sagduyu YE, Berry RA, Ephremides A (2011) Jamming games in wireless networks with incomplete information. IEEE Commun Mag, 49(8)","journal-title":"IEEE Communications Magazine"},{"key":"291_CR99","doi-asserted-by":"crossref","unstructured":"Sagduyu YE, Berry R, Ephremides A (2009) MAC games for distributed wireless network security with incomplete information of selfish and malicious user types. In: Proceedings of international conference on game theory for networks. IEEE, pp 130\u2013139","DOI":"10.1109\/GAMENETS.2009.5137394"},{"issue":"5","key":"291_CR100","doi-asserted-by":"crossref","first-page":"31","DOI":"10.4304\/jnw.1.5.31-42","volume":"1","author":"K Sallhammar","year":"2006","unstructured":"Sallhammar K, Helvik BE, Knapskog SJ (2006) On stochastic modeling for integrated security and dependability evaluation. JNW 1(5):31\u201342","journal-title":"JNW"},{"key":"291_CR101","doi-asserted-by":"crossref","unstructured":"Sallhammar K, Knapskog SJ, Helvik BE (2005) Using stochastic game theory to compute the expected behavior of attackers. In: 2005 symposium on applications and the internet workshops, saint workshops. IEEE, pp 102\u2013105","DOI":"10.1109\/SAINTW.2005.1619988"},{"key":"291_CR102","doi-asserted-by":"crossref","unstructured":"Sanjab A, Saad W, Ba\u015far T (2017) Prospect theory for enhanced cyber-physical security of drone delivery systems: a network interdiction game. In: Proceedings of IEEE ICC 2017 communication and information security symposium (CISS 2017), Paris, France, May 21\u201325","DOI":"10.1109\/ICC.2017.7996862"},{"issue":"1","key":"291_CR103","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/TCNS.2016.2598427","volume":"4","author":"D Shelar","year":"2017","unstructured":"Shelar D, Amin S (2017) Security assessment of electricity distribution networks under DER node compromises. IEEE Trans Control Netw Syst 4(1):23\u201336","journal-title":"IEEE Trans Control Netw Syst"},{"key":"291_CR104","doi-asserted-by":"crossref","unstructured":"Shen D, Chen G, Blasch E, Tadda G (2007) Adaptive Markov game theoretic data fusion approach for cyber network defense. In: Military communications conference (MILCOM). IEEE, pp 1\u20137","DOI":"10.1109\/MILCOM.2007.4454758"},{"issue":"1","key":"291_CR105","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/s13235-010-0006-z","volume":"1","author":"S Sorin","year":"2011","unstructured":"Sorin S (2011) Zero-sum repeated games: recent advances and new links with differential games. Dynamic games and applications 1(1):172\u2013207","journal-title":"Dynamic games and applications"},{"key":"291_CR106","doi-asserted-by":"crossref","unstructured":"Trejo KK, Clempner JB, Poznyak AS (2016) Adapting strategies to dynamic environments in controllable Stackelberg security games. In: Proceedings of IEEE 55th conference on decision and control (CDC), pp 5484\u20135489","DOI":"10.1109\/CDC.2016.7799111"},{"key":"291_CR107","doi-asserted-by":"crossref","unstructured":"Truong A, Etesami SR, Etesami J, Kiyavash N (2018) Optimal attack strategies against predictors-learning from expert advice. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2017.2718488"},{"issue":"1","key":"291_CR108","first-page":"13","volume":"1","author":"S Wang","year":"2017","unstructured":"Wang S, Shroff N (2017) Security game with non-additive utilities and multiple attacker resources. Proc ACM Measur Anal Comput Syst 1(1):13","journal-title":"Proc ACM Measur Anal Comput Syst"},{"key":"291_CR109","doi-asserted-by":"crossref","unstructured":"Wang Y, Wang Y, Liu J, Huang Z, Xie P (2016) A survey of game theoretic methods for cyber security. In: IEEE international conference on data science in cyberspace (DSC), pp 631\u2013636","DOI":"10.1109\/DSC.2016.90"},{"key":"291_CR110","doi-asserted-by":"crossref","unstructured":"Xiaolin C, Xiaobin T, Yong Z, Hongsheng X (2008) A Markov game theory-based risk assessment model for network information system. In: International conference on computer science and software engineering, vol 3. IEEE, pp 1057\u20131061","DOI":"10.1109\/CSSE.2008.949"},{"key":"291_CR111","doi-asserted-by":"crossref","unstructured":"Zhang N, Yu W, Fu X, Das SK (2010) gPath: a game-theoretic path selection algorithm to protect Tors anonymity. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 58\u201371","DOI":"10.1007\/978-3-642-17197-0_4"},{"key":"291_CR112","doi-asserted-by":"crossref","unstructured":"Zheng J, Casta\u00f1\u00f3n DA (2012) Dynamic network interdiction games with imperfect information and deception. In: IEEE 51st annual conference on decision and control (CDC), pp 7758\u20137763","DOI":"10.1109\/CDC.2012.6425974"},{"key":"291_CR113","unstructured":"Zheng J, Castan\u00f3n DA (2012) Stochastic dynamic network interdiction games. In: Proceedings of IEEE American control conference (ACC), pp 1838\u20131844"},{"key":"291_CR114","doi-asserted-by":"crossref","unstructured":"Zhou Z, Bambos N, Glynn P (2016) Dynamics on linear influence network games under stochastic environments. In: Proceedings of international conference on decision and game theory for security (GameSec). Springer, pp 114\u2013126","DOI":"10.1007\/978-3-319-47413-7_7"},{"issue":"1","key":"291_CR115","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MCS.2014.2364710","volume":"35","author":"Q Zhu","year":"2015","unstructured":"Zhu Q, Ba\u015far T (2015) Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst 35(1):46\u201365","journal-title":"IEEE Control Syst"},{"issue":"11","key":"291_CR116","doi-asserted-by":"crossref","first-page":"2220","DOI":"10.1109\/JSAC.2012.121214","volume":"30","author":"Q Zhu","year":"2012","unstructured":"Zhu Q, Fung C, Boutaba R, Ba\u015far T (2012) GUIDEX: a game-theoretic incentive-based mechanism for intrusion detection networks. IEEE J Select Areas Commun (JSAC) Spec Iss Econ Commun Netw Syst (SI-NetEcon) 30(11):2220\u20132230","journal-title":"IEEE J Select Areas Commun (JSAC) Spec Iss Econ Commun Netw Syst (SI-NetEcon)"},{"key":"291_CR117","doi-asserted-by":"crossref","unstructured":"Zhu Q, Ba\u015far T (2009) Dynamic policy-based IDS configuration. In: Proceedings of the 48th IEEE conference on decision and control (CDC), pp 8600\u20138605","DOI":"10.1109\/CDC.2009.5399894"},{"key":"291_CR118","doi-asserted-by":"crossref","unstructured":"Zhu Q, Ba\u015far T (2012) A dynamic game-theoretic approach to resilient control system design for cascading failures. In: Proceedings of the 1st international conference on high confidence networked systems. ACM, pp 41\u201346","DOI":"10.1145\/2185505.2185512"},{"key":"291_CR119","doi-asserted-by":"crossref","unstructured":"Zhu Q, Clark A, Poovendran R, Ba\u015far T (2012) Deceptive routing games. In: IEEE 51st annual conference on decision and control (CDC), pp 2704\u20132711","DOI":"10.1109\/CDC.2012.6426515"},{"key":"291_CR120","doi-asserted-by":"crossref","unstructured":"Zhu Q, Tembine H, Ba\u015far T (2010) Heterogeneous learning in zero-sum stochastic games with incomplete information. In: 49th IEEE conference on decision and control (CDC), pp 219\u2013224","DOI":"10.1109\/CDC.2010.5718053"},{"key":"291_CR121","unstructured":"Zhu Q, Tembine H, Ba\u015far T (2010) Network security configurations: a nonzero-sum stochastic game approach. In: IEEE American control conference (ACC), pp 1059\u20131064"},{"key":"291_CR122","unstructured":"Zhu Q, Tembine H, Ba\u015far T (2013) Hybrid learning in stochastic games and its applications in network security. In: Lewis FL, Liu D (eds) Reinforcement Learning and Approximate Dynamic Programming for Feedback Control, Series on Computational Intelligence, IEEE Press\/Wiley, chapter 14, pp 305\u2013329"},{"issue":"2","key":"291_CR123","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/TPDS.2013.211","volume":"25","author":"SA Zonouz","year":"2014","unstructured":"Zonouz SA, Khurana H, Sanders WH, Yardley TM (2014) RRE: a game-theoretic intrusion response and recovery engine. IEEE Trans Parallel Distrib Syst 25(2):395\u2013406","journal-title":"IEEE Trans Parallel Distrib Syst"}],"container-title":["Dynamic Games and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-018-00291-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13235-018-00291-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-018-00291-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T12:16:16Z","timestamp":1662725776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13235-018-00291-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":123,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["291"],"URL":"https:\/\/doi.org\/10.1007\/s13235-018-00291-y","relation":{},"ISSN":["2153-0785","2153-0793"],"issn-type":[{"value":"2153-0785","type":"print"},{"value":"2153-0793","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,1]]},"assertion":[{"value":"1 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}