{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:54:33Z","timestamp":1740160473427,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T00:00:00Z","timestamp":1664236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T00:00:00Z","timestamp":1664236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902426"],"award-info":[{"award-number":["61902426"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Dyn Games Appl"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s13235-022-00476-6","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T03:39:36Z","timestamp":1664249976000},"page":"980-1004","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Optimal Group Decision-Making Approach for Cyber Security Using Improved Selection-Drift Dynamics"],"prefix":"10.1007","volume":"13","author":[{"given":"Enning","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9996-7291","authenticated-orcid":false,"given":"Gang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Runnian","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,27]]},"reference":[{"issue":"3","key":"476_CR1","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/SURV.2011.122310.000119","volume":"13","author":"K Akkarajitsakul","year":"2011","unstructured":"Akkarajitsakul K, Hossain E, Niyato D, Kim DI (2011) Game theoretic approaches for multiple access in wireless networks: a survey. IEEE Commun Surveys Tutorials 13(3):372\u2013395. https:\/\/doi.org\/10.1109\/SURV.2011.122310.000119","journal-title":"IEEE Commun Surveys Tutorials"},{"key":"476_CR2","doi-asserted-by":"crossref","unstructured":"Alpcan T, Ba\u015far T (2010) Network security: A decision and game-theoretic approach. Cambridge University Press. London, pp 3\u201313.","DOI":"10.1017\/CBO9780511760778"},{"issue":"2","key":"476_CR3","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani A, Myneni S, Chowdhary A, Dijiang H (2019) A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities. IEEE Commun Surveys Tutorials 21(2):1851\u20131877. https:\/\/doi.org\/10.1109\/COMST.2019.2891891","journal-title":"IEEE Commun Surveys Tutorials"},{"key":"476_CR4","doi-asserted-by":"publisher","unstructured":"Attiah A, Chatterjee M, Zou CC (2018) A game theoretic approach to model cyber attack and defense strategies. In: 2018 IEEE International Conference on Communications (ICC). pp 1\u20137. doi: https:\/\/doi.org\/10.1109\/ICC.2018.8422719","DOI":"10.1109\/ICC.2018.8422719"},{"issue":"12","key":"476_CR5","doi-asserted-by":"publisher","first-page":"582","DOI":"10.3390\/info11120582","volume":"11","author":"S Boudko","year":"2020","unstructured":"Boudko S, Aursand P, Abie H (2020) Evolutionary game for confidentiality in IoT-enabled smart grids. Information 11(12):582. https:\/\/doi.org\/10.3390\/info11120582","journal-title":"Information"},{"issue":"4","key":"476_CR6","doi-asserted-by":"publisher","first-page":"2014","DOI":"10.1109\/TPWRS.2004.836180","volume":"19","author":"D Chattopadhyay","year":"2004","unstructured":"Chattopadhyay D (2004) A game theoretic model for strategic maintenance and dispatch decisions. IEEE Trans Power Syst 19(4):2014\u20132021. https:\/\/doi.org\/10.1109\/TPWRS.2004.836180","journal-title":"IEEE Trans Power Syst"},{"issue":"2","key":"476_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3057268","volume":"50","author":"CT Do","year":"2018","unstructured":"Do CT, Tran NH, Hong C, Kamhoua CA, Kwiat KA, Blasch E, Shaolei R, Pissinou N, Iyengar SS (2018) Game theory for cyber security and privacy. ACM Comput Surveys (CSUR) 50(2):1\u201337. https:\/\/doi.org\/10.1145\/3057268","journal-title":"ACM Comput Surveys (CSUR)"},{"issue":"3","key":"476_CR8","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TIFS.2017.2758756","volume":"13","author":"J Du","year":"2017","unstructured":"Du J, Jiang C, Chen KC, Ren Y, Poor HV (2017) Community-structured evolutionary game for privacy protection in social networks. IEEE Trans Inf Forensics Secur 13(3):574\u2013589. https:\/\/doi.org\/10.1109\/TIFS.2017.2758756","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"476_CR9","unstructured":"Galov N, (2022) \"53 Cybersecurity Statistics from 2021: Stay Safe in the New Decade.\" Feb.18, 2022. Accessed: Feb.28, 2022. [Online]. Available: https:\/\/hostingtribunal.com\/blog\/cybersecurity-statistics\/"},{"issue":"3","key":"476_CR10","first-page":"1","volume":"21","author":"LA Gordon","year":"2005","unstructured":"Gordon LA, Loeb MP, Lucyshyn W, Richardson R (2005) CSI\/FBI computer crime and security survey. Comput Secur J 21(3):1","journal-title":"Comput Secur J"},{"issue":"3","key":"476_CR11","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TNSM.2020.2995713","volume":"17","author":"H Hu","year":"2020","unstructured":"Hu H, Liu Y, Chen C, Zhang H, Liu Y (2020) Optimal decision making approach for cyber security defense using evolutionary game. IEEE Trans Netw Serv Manage 17(3):1683\u20131700. https:\/\/doi.org\/10.1109\/TNSM.2020.2995713","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"476_CR12","doi-asserted-by":"publisher","first-page":"29806","DOI":"10.1109\/ACCESS.2018.2841885","volume":"6","author":"H Hu","year":"2018","unstructured":"Hu H, Liu Y, Zhang H, Pan R (2018) Optimal network defense strategy selection based on incomplete information evolutionary game. IEEE Access 6:29806\u201329821. https:\/\/doi.org\/10.1109\/ACCESS.2018.2841885","journal-title":"IEEE Access"},{"key":"476_CR13","doi-asserted-by":"crossref","unstructured":"Hubbard DW, Seiersen R, (2016) How to measure anything in cybersecurity risk. John Wiley & Sons. pp 4\u201310.","DOI":"10.1002\/9781119162315"},{"key":"476_CR14","doi-asserted-by":"publisher","unstructured":"Kamhoua CA, Pissinou N, Makki K (2011) Game theoretic modeling and evolution of trust in autonomous multi-hop networks: application to network security and privacy. In: 2011 IEEE International Conference on Communications (ICC). pp 1\u20136. doi: https:\/\/doi.org\/10.1109\/icc.2011.5962511","DOI":"10.1109\/icc.2011.5962511"},{"issue":"1","key":"476_CR15","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1006\/jtbi.2000.2240","volume":"209","author":"NL Komarova","year":"2001","unstructured":"Komarova NL, Niyogi P, Nowak MA (2001) The evolutionary dynamics of grammar acquisition. J Theor Biol 209(1):43\u201359. https:\/\/doi.org\/10.1006\/jtbi.2000.2240","journal-title":"J Theor Biol"},{"issue":"2","key":"476_CR16","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.arcontrol.2014.09.002","volume":"38","author":"NE Leonard","year":"2014","unstructured":"Leonard NE (2014) Multi-agent system dynamics: Bifurcation and behavior of animal groups. Annu Rev Control 38(2):171\u2013183. https:\/\/doi.org\/10.1016\/j.arcontrol.2014.09.002","journal-title":"Annu Rev Control"},{"key":"476_CR17","doi-asserted-by":"publisher","first-page":"178605","DOI":"10.1109\/ACCESS.2019.2958856","volume":"7","author":"B Li","year":"2019","unstructured":"Li B, Chen Y, Huang S, Yao R, Xia Y, Mei S (2019) Graphical evolutionary game model of virus-based intrusion to power system for long-term cyber-security risk evaluation. IEEE Access 7:178605\u2013178617. https:\/\/doi.org\/10.1109\/ACCESS.2019.2958856","journal-title":"IEEE Access"},{"issue":"6","key":"476_CR18","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1007\/s11424-019-7420-0","volume":"32","author":"Y Li","year":"2019","unstructured":"Li Y, Deng Y, Xiao Y, Wu J (2019) Attack and defense strategies in complex networks based on game theory. J Syst Sci Complexity 32(6):1630\u20131640. https:\/\/doi.org\/10.1007\/s11424-019-7420-0","journal-title":"J Syst Sci Complexity"},{"issue":"3","key":"476_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei MH, Zhu Q, Alpcan T, Ba\u015far T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surveys (CSUR) 45(3):1\u201339. https:\/\/doi.org\/10.1145\/2480741.2480742","journal-title":"ACM Comput Surveys (CSUR)"},{"key":"476_CR20","unstructured":"Massaquoi SG (1999) Modeling the function of the cerebellum in scheduled linear servo control of simple horizontal planar arm movements. Massachusetts Institute of Technology. uri: http:\/\/hdl.handle.net\/1721.1\/9083"},{"key":"476_CR21","doi-asserted-by":"publisher","unstructured":"Olfati SR (2007) Evolutionary dynamics of behavior in social networks. In: 2007 46th IEEE conference on decision and control. pp 4051\u20134056. doi: https:\/\/doi.org\/10.1109\/CDC.2007.4435009","DOI":"10.1109\/CDC.2007.4435009"},{"issue":"2","key":"476_CR22","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.biosystems.2009.10.003","volume":"99","author":"M Perc","year":"2010","unstructured":"Perc M, Szolnoki A (2010) Coevolutionary games\u2014a mini review. BioSystems 99(2):109\u2013125. https:\/\/doi.org\/10.1016\/j.biosystems.2009.10.003","journal-title":"BioSystems"},{"key":"476_CR23","doi-asserted-by":"publisher","unstructured":"Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q, (2010) A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences. pp 1\u201310. https:\/\/doi.org\/10.1109\/HICSS.2010.35","DOI":"10.1109\/HICSS.2010.35"},{"key":"476_CR24","doi-asserted-by":"publisher","unstructured":"Ruan N, Gao L, Zhu H, Jia W, Li X, Hu Q, (2016) Toward optimal dos-resistant authentication in crowdsensing networks via evolutionary game. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). pp 364\u2013373. doi: https:\/\/doi.org\/10.1109\/ICDCS.2016.66","DOI":"10.1109\/ICDCS.2016.66"},{"key":"476_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-0716-0368-0_188","author":"WH Sandholm","year":"2020","unstructured":"Sandholm WH (2020) Evolutionary game theory. Complex Social Behavioral Systems: Game Theory Agent-Based Models. https:\/\/doi.org\/10.1007\/978-1-0716-0368-0_188","journal-title":"Complex Social Behavioral Systems: Game Theory Agent-Based Models"},{"issue":"1","key":"476_CR26","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/S0022-5193(80)81038-1","volume":"84","author":"R Selten","year":"1980","unstructured":"Selten R (1980) A note on evolutionarily stable strategies in asymmetric animal conflicts. J Theoretical Biol 84(1):93\u2013101. https:\/\/doi.org\/10.1016\/S0022-5193(80)81038-1","journal-title":"J Theoretical Biol"},{"issue":"4","key":"476_CR27","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1152\/jn.00840.2016","volume":"117","author":"R Shadmehr","year":"2017","unstructured":"Shadmehr R (2017) Distinct neural circuits for control of movement vs. holding still. J Neurophys 117(4):1431\u20131460. https:\/\/doi.org\/10.1152\/jn.00840.2016","journal-title":"J Neurophys"},{"issue":"7","key":"476_CR28","doi-asserted-by":"publisher","first-page":"1694","DOI":"10.1109\/TCYB.2016.2555316","volume":"47","author":"S Tan","year":"2016","unstructured":"Tan S, Wang Y, Chen Y, Wang Z (2016) Evolutionary dynamics of collective behavior selection and drift: flocking, collapse, and oscillation. IEEE Trans Cyber 47(7):1694\u20131705. https:\/\/doi.org\/10.1109\/TCYB.2016.2555316","journal-title":"IEEE Trans Cyber"},{"key":"476_CR29","doi-asserted-by":"publisher","unstructured":"Tan, S., Wang, Y., Vasilakos, A.V., 2021. Distributed population dynamics for searching generalized nash equilibria of population games with graphical strategy interactions. IEEE Transactions on Systems, Man, and Cybernetics: Systems (Early Access). doi: https:\/\/doi.org\/10.1109\/TSMC.2021.3062827","DOI":"10.1109\/TSMC.2021.3062827"},{"key":"476_CR30","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-4-431-54962-8","volume-title":"Fundamentals of evolutionary game theory and its applications","author":"J Tanimoto","year":"2015","unstructured":"Tanimoto J (2015) Fundamentals of evolutionary game theory and its applications. Springer, Japan, pp 69\u201390"},{"key":"476_CR31","unstructured":"Tenable\u00ae. (2022) \"Nessus Vulnerability Scanner.\" Accessed Feb.22, 2022. [Online]. Available: https:\/\/www.tenable.com\/downloads\/nessus"},{"issue":"6","key":"476_CR32","doi-asserted-by":"publisher","first-page":"5971","DOI":"10.1109\/TVT.2019.2910217","volume":"68","author":"Z Tian","year":"2019","unstructured":"Tian Z, Gao X, Su S, Qiu J, Du X, Guizani M (2019) Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory. IEEE Trans Veh Technol 68(6):5971\u20135980. https:\/\/doi.org\/10.1109\/TVT.2019.2910217","journal-title":"IEEE Trans Veh Technol"},{"key":"476_CR33","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jcss.2016.08.005","volume":"98","author":"D Tosh","year":"2018","unstructured":"Tosh D, Sengupta S, Kamhoua CA, Kwiat KA (2018) Establishing evolutionary game models for CYBer security information exchange (CYBEX). J Comput Syst Sci 98:27\u201352. https:\/\/doi.org\/10.1016\/j.jcss.2016.08.005","journal-title":"J Comput Syst Sci"},{"key":"476_CR34","unstructured":"United States Department of Commerce, (2022) \"National vulnerability database.\" https:\/\/nvd.nist.gov\/vuln\/search (accessed Feb.22, 2022)"},{"key":"476_CR35","unstructured":"United States Department of Homeland Security (DHS), (2022) \"Common attack pattern enumeration and classification (CAPEC).\" http:\/\/capec.mitre.org\/ (accessed Feb.22, 2022)"},{"key":"476_CR36","unstructured":"United States Department of Homeland Security (DHS), (2022) \"Common weakness enumeration (CWE).\" http:\/\/cwe.mitre.org\/index.html (accessed Feb.22, 2022)"},{"issue":"3","key":"476_CR37","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.comcom.2010.01.021","volume":"34","author":"Y Wang","year":"2011","unstructured":"Wang Y, Nakao A, Vasilakos AV, Ma J (2011) P2P soft security: On evolutionary dynamics of P2P incentive mechanism. Comput Commun 34(3):241\u2013249. https:\/\/doi.org\/10.1016\/j.comcom.2010.01.021","journal-title":"Comput Commun"},{"issue":"5","key":"476_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjb\/e2015-60270-7","volume":"88","author":"Z Wang","year":"2015","unstructured":"Wang Z, Wang L, Szolnoki A, Perc M (2015) Evolutionary games on multilayer networks: a colloquium. Eur Phys J B 88(5):1\u201315. https:\/\/doi.org\/10.1140\/epjb\/e2015-60270-7","journal-title":"Eur Phys J B"},{"issue":"1","key":"476_CR39","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s11071-010-9850-z","volume":"64","author":"X Xu","year":"2011","unstructured":"Xu X, Chen Z, Si G, Hu X, Jiang Y, Xu X (2011) The chaotic dynamics of the social behavior selection networks in crowd simulation. Nonlinear Dyn 64(1):117\u2013126. https:\/\/doi.org\/10.1007\/s11071-010-9850-z","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"476_CR40","doi-asserted-by":"publisher","first-page":"215","DOI":"10.3390\/sym11020215","volume":"11","author":"Y Yang","year":"2019","unstructured":"Yang Y, Che B, Zeng Y, Cheng Y, Li C (2019) MAIAD: a multistage asymmetric information attack and defense model based on evolutionary game theory. Symmetry 11(2):215. https:\/\/doi.org\/10.3390\/sym11020215","journal-title":"Symmetry"},{"issue":"23","key":"476_CR41","doi-asserted-by":"publisher","first-page":"3014","DOI":"10.3390\/math9233014","volume":"9","author":"P Yang","year":"2021","unstructured":"Yang P, Gao F, Zhang H (2021) Multi-player evolutionary game of network attack and defense based on system dynamics. Mathematics 9(23):3014. https:\/\/doi.org\/10.3390\/math9233014","journal-title":"Mathematics"}],"container-title":["Dynamic Games and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-022-00476-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13235-022-00476-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-022-00476-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T17:32:25Z","timestamp":1691688745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13235-022-00476-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,27]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["476"],"URL":"https:\/\/doi.org\/10.1007\/s13235-022-00476-6","relation":{},"ISSN":["2153-0785","2153-0793"],"issn-type":[{"type":"print","value":"2153-0785"},{"type":"electronic","value":"2153-0793"}],"subject":[],"published":{"date-parts":[[2022,9,27]]},"assertion":[{"value":"5 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled, \u201cAn Optimal Group Decision-Making Approach for Cyber Security Using Improved Selection-Drift Dynamics.\u201d","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}