{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:24:59Z","timestamp":1774963499594,"version":"3.50.1"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.comcom.2026.108503","type":"journal-article","created":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T07:50:06Z","timestamp":1774425006000},"page":"108503","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Game-theoretic modeling of ISP\u2013CP interactions with bounded rational users: Equilibrium analysis and computational insights"],"prefix":"10.1016","volume":"251","author":[{"given":"Mohamed","family":"Sebnat","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Garmani","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Baslam","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2026.108503_b1","series-title":"Cisco Visual Networking Index: Forecast and Methodology","first-page":"2016","author":"Cisco Systems, Inc.","year":"2017"},{"key":"10.1016\/j.comcom.2026.108503_b2","series-title":"Game Theory","author":"Fudenberg","year":"1991"},{"key":"10.1016\/j.comcom.2026.108503_b3","series-title":"Theory of Games and Economic Behavior","author":"Morgenstern","year":"1964"},{"key":"10.1016\/j.comcom.2026.108503_b4","series-title":"Models of Man: Social and Rational","author":"Simon","year":"1957"},{"key":"10.1016\/j.comcom.2026.108503_b5","doi-asserted-by":"crossref","first-page":"1255","DOI":"10.2307\/2938316","article-title":"Rationalizability, learning, and equilibrium in games with strategic complementarities","author":"Milgrom","year":"1990","journal-title":"Econometrica"},{"key":"10.1016\/j.comcom.2026.108503_b6","unstructured":"P. Shukla, M. Banerjee, P.T. Adidam, Antecedents and consequences of consumer confusion: Analysis of the financial services industry, in: ACR North American Advances, 2010, pp. 292\u2013297."},{"key":"10.1016\/j.comcom.2026.108503_b7","series-title":"Social Norms, Bounded Rationality and Optimal Contracts","volume":"vol. 30","author":"Basov","year":"2016"},{"key":"10.1016\/j.comcom.2026.108503_b8","series-title":"Bounded Rationality in Decision Making Under Uncertainty: Towards Optimal Granularity","volume":"vol. 99","author":"Lorkowski","year":"2018"},{"key":"10.1016\/j.comcom.2026.108503_b9","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/S1388-3437(03)80182-8","article-title":"Telecommunications network equilibrium with price and quality-of-service characteristics","volume":"5","author":"Azouzi","year":"2003","journal-title":"Teletraffic Sci. Eng."},{"key":"10.1016\/j.comcom.2026.108503_b10","series-title":"Incentives, Overlays, and Economic Traffic Control","first-page":"76","article-title":"A study of non-neutral networks with usage-based prices","author":"Altman","year":"2010"},{"key":"10.1016\/j.comcom.2026.108503_b11","series-title":"International Conference on Research in Networking","first-page":"68","article-title":"Network non-neutrality debate: An economic analysis","author":"Altman","year":"2011"},{"key":"10.1016\/j.comcom.2026.108503_b12","series-title":"Networking 2012 Workshops","first-page":"121","article-title":"In which content to specialize? A game theoretic analysis","author":"Altman","year":"2012"},{"key":"10.1016\/j.comcom.2026.108503_b13","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MSP.2009.933496","article-title":"Methodologies for analyzing equilibria in wireless games","volume":"26","author":"Lasaulce","year":"2009","journal-title":"IEEE Signal Process. Mag."},{"key":"10.1016\/j.comcom.2026.108503_b14","series-title":"Network Games, Control and Optimization, NetGCoOP, 2011 5th International Conference on","first-page":"1","article-title":"Market share game with adversarial access providers: A neutral and a non-neutral network analysis","author":"Baslam","year":"2011"},{"key":"10.1016\/j.comcom.2026.108503_b15","series-title":"6th International ICST Conference on Performance Evaluation Methodologies and Tools","first-page":"280","article-title":"New insights from a bounded rationality analysis for strategic price-qos war","author":"Baslam","year":"2012"},{"key":"10.1016\/j.comcom.2026.108503_b16","doi-asserted-by":"crossref","first-page":"88","DOI":"10.4018\/IJBDCN.2019010106","article-title":"A non-cooperative game analysis of competition between content providers in the internet market","volume":"15","author":"Outanoute","year":"2019","journal-title":"Int. J. Bus. Data Commun. Netw."},{"key":"10.1016\/j.comcom.2026.108503_b17","doi-asserted-by":"crossref","unstructured":"T. Mouhyiddine, E. Sabir, M. Sadik, Telecommunications market share game with ambiguous pricing strategies, in: 2014 International Conference on Next Generation Networks and Services, NGNS, 2014, pp. 202\u2013208.","DOI":"10.1109\/NGNS.2014.6990253"},{"key":"10.1016\/j.comcom.2026.108503_b18","series-title":"2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications","first-page":"1","article-title":"Telecommunication market share game: Inducing boundedly rational consumers via price misperception","author":"Handouf","year":"2016"},{"key":"10.1016\/j.comcom.2026.108503_b19","series-title":"Networked Systems","first-page":"457","article-title":"Joint price and qos competition with bounded rational customers","author":"Omar","year":"2017"},{"key":"10.1016\/j.comcom.2026.108503_b20","article-title":"A customer confusion environment in telecommunication networks: Analysis and policy impact","volume":"28","author":"Omar","year":"2019","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"10.1016\/j.comcom.2026.108503_b21","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s11066-019-09136-1","article-title":"A stackelberg game-based approach for interactions among internet service providers and content providers","volume":"20","author":"Garmani","year":"2019","journal-title":"Netnomics"},{"key":"10.1016\/j.comcom.2026.108503_b22","article-title":"The effect of caching on CP and ISP policies in information-centric networks","volume":"2020","author":"Garmani","year":"2020","journal-title":"Mob. Inf. Syst."},{"key":"10.1016\/j.comcom.2026.108503_b23","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.peva.2017.04.006","article-title":"Caching games between content providers and internet service providers","volume":"113","author":"Douros","year":"2017","journal-title":"Perform. Eval."},{"key":"10.1016\/j.comcom.2026.108503_b24","doi-asserted-by":"crossref","first-page":"40485","DOI":"10.1109\/ACCESS.2018.2849103","article-title":"A collaborative pricing framework for in-network caching in information-centric networking","volume":"6","author":"Duan","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2026.108503_b25","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1504\/IJAHUC.2020.110819","article-title":"Nash bargaining and policy impact in emerging ISP-CP relationships","volume":"35","author":"Garmani","year":"2020","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"10.1016\/j.comcom.2026.108503_b26","series-title":"International Conference on Networked Systems","first-page":"136","article-title":"Analysis of interactions among infrastructure provider fronting content provider","author":"Garmani","year":"2022"},{"key":"10.1016\/j.comcom.2026.108503_b27","doi-asserted-by":"crossref","first-page":"5771","DOI":"10.1007\/s11276-023-03341-5","article-title":"A novel game theoretic approach for market-driven dynamic spectrum access in cognitive radio networks","volume":"30","author":"Igried","year":"2024","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.comcom.2026.108503_b28","series-title":"2024 International Conference on Ubiquitous Networking","first-page":"1","article-title":"Qos-constrained profit maximization for primary users in competitive cognitive radio networks","author":"Daoudi","year":"2024"},{"key":"10.1016\/j.comcom.2026.108503_b29","doi-asserted-by":"crossref","DOI":"10.1016\/j.fss.2025.109512","article-title":"Generalized unified well-posedness of equilibrium solutions for fuzzy multi-leader-multi-follower games under bounded rationality","volume":"518","author":"Zhou","year":"2025","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.comcom.2026.108503_b30","first-page":"1490","article-title":"Existence and stability of fuzzy slightly altruistic equilibrium for a class of generalized multiobjective fuzzy games","volume":"202","author":"Jia","year":"2024","journal-title":"J. Optim. Theory Appl."},{"key":"10.1016\/j.comcom.2026.108503_b31","doi-asserted-by":"crossref","first-page":"45","DOI":"10.3390\/math8010045","article-title":"An approximation theorem for vector equilibrium problems under bounded rationality","volume":"8","author":"Jia","year":"2020","journal-title":"Mathematics"},{"key":"10.1016\/j.comcom.2026.108503_b32","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s10957-024-02379-5","article-title":"Well-posedness for mean field games with finite state and action space","volume":"201","author":"Liu","year":"2024","journal-title":"J. Optim. Theory Appl."},{"key":"10.1016\/j.comcom.2026.108503_b33","article-title":"Cooperative emergence induced by asymmetric punishment and strategy persistence mechanisms in multilayer networks","volume":"143","author":"Li","year":"2025","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"10.1016\/j.comcom.2026.108503_b34","doi-asserted-by":"crossref","first-page":"454","DOI":"10.3390\/math9050454","article-title":"An intelligent algorithm for solving the efficient Nash equilibrium of a single-leader multi-follower game","volume":"9","author":"Liu","year":"2021","journal-title":"Mathematics"},{"key":"10.1016\/j.comcom.2026.108503_b35","doi-asserted-by":"crossref","first-page":"15249","DOI":"10.1109\/JIOT.2025.3530449","article-title":"Incorporating bounded rationality into electric vehicle highway charging decisions: A Bayesian game analysis","volume":"12","author":"Yan","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comcom.2026.108503_b36","doi-asserted-by":"crossref","first-page":"3950","DOI":"10.1109\/TSG.2024.3363040","article-title":"Optimal dynamic pricing of fast charging stations considering bounded rationality of users and market regulation","volume":"15","author":"Chen","year":"2024","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.comcom.2026.108503_b37","series-title":"2017 IEEE 37th International Conference on Distributed Computing Systems","first-page":"1780","article-title":"Ensuring network neutrality for future distributed systems","author":"Garrett","year":"2017"},{"key":"10.1016\/j.comcom.2026.108503_b38","doi-asserted-by":"crossref","first-page":"520","DOI":"10.2307\/1911749","article-title":"Existence and uniqueness of equilibrium points for concave n-person games","volume":"33","author":"Rosen","year":"1965","journal-title":"Econometrica"},{"key":"10.1016\/j.comcom.2026.108503_b39","unstructured":"D. Gabay, H. Moulin, On the uniqueness and stability of nash equilibria in noncooperative games, in: Applied Stochastic Control in Econometrics and Management Science, 1980."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366426000939?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366426000939?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T12:38:48Z","timestamp":1774960728000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366426000939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":39,"alternative-id":["S0140366426000939"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2026.108503","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Game-theoretic modeling of ISP\u2013CP interactions with bounded rational users: Equilibrium analysis and computational insights","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2026.108503","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108503"}}