{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T22:40:08Z","timestamp":1750027208101,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319548753"},{"type":"electronic","value":"9783319548760"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54876-0_14","type":"book-chapter","created":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T09:36:57Z","timestamp":1488361017000},"page":"169-182","source":"Crossref","is-referenced-by-count":0,"title":["A Framework to Reduce the Cost of Monitoring and Diagnosis Using Game Theory"],"prefix":"10.1007","author":[{"given":"Rui","family":"Abreu","sequence":"first","affiliation":[]},{"given":"C\u00e9sar","family":"Andr\u00e9s","sequence":"additional","affiliation":[]},{"given":"Ana R.","family":"Cavalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,2]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Agah, A., Das, S.K., Basu, K., Asadi, M.: Intrusion detection in sensor networks: a non-cooperative game approach. In: Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA 2004), pp. 343\u2013346. IEEE (2004)","DOI":"10.1109\/NCA.2004.1347798"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of 42nd IEEE Conference on Decision and Control, vol. 3, pp. 2595\u20132600. IEEE (2003)","DOI":"10.1109\/CDC.2003.1273013"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Basar, T.: A game theoretic analysis of intrusion detection in access control systems. In: 43rd IEEE Conference on Decision and Control, CDC, vol. 2, pp. 1568\u20131573. IEEE (2004)","DOI":"10.1109\/CDC.2004.1430267"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Aumann, R.J.: Game theory. In: Eatwell, J., Milgate, M., Newman, P. (eds.) Game Theory, The New Palgrave, pp. 1\u201353. Springer, Heidelberg (1989)","DOI":"10.1007\/978-1-349-20181-5_1"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-540-73589-2_25","volume-title":"ECOOP 2007 \u2013 Object-Oriented Programming","author":"E Bodden","year":"2007","unstructured":"Bodden, E., Hendren, L., Lhot\u00e1k, O.: A staged static program analysis to improve the performance of runtime monitoring. In: Ernst, E. (ed.) ECOOP 2007. LNCS, vol. 4609, pp. 525\u2013549. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-73589-2_25"},{"issue":"1","key":"14_CR6","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/52.62930","volume":"8","author":"BW Boehm","year":"1991","unstructured":"Boehm, B.W.: Software risk management: principles and practices. IEEE Softw. 8(1), 32\u201341 (1991)","journal-title":"IEEE Softw."},{"issue":"1","key":"14_CR7","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"JO Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41\u201350 (2003)","journal-title":"Computer"},{"issue":"5","key":"14_CR8","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Logic Algebraic Program. 78(5), 293\u2013303 (2009)","journal-title":"J. Logic Algebraic Program."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Bac\u015far, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 25:1\u201325:39 (2013)","DOI":"10.1145\/2480741.2480742"},{"key":"14_CR10","unstructured":"Mok, A.K.: Fundamental design problems of distributed systems for the hard-real-time environment (1983)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Saad, W., Han, Z., Debbah, M., Hjorungnes, A., Basar, T.: Coalitional game theory for communication networks: a tutorial. CoRR, abs\/0905.4057 (2009)","DOI":"10.1109\/ICIMP.2010.14"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Tan, J., Pan, X., Marinelli, E., Kavulya, S., Gandhi, R., Narasimhan, P.: Kahuna: problem diagnosis for mapreduce-based cloud computing environments. In: 2010 IEEE Network Operations and Management Symposium-NOMS 2010, pp. 112\u2013119. IEEE (2010)","DOI":"10.1109\/NOMS.2010.5488446"},{"key":"14_CR13","volume-title":"Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents","author":"J Viega","year":"2001","unstructured":"Viega, J., McGraw, G.: Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents. Pearson Education, Upper Saddle River (2001)"}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54876-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T22:07:14Z","timestamp":1750025234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54876-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319548753","9783319548760"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54876-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}