{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T12:40:03Z","timestamp":1739450403489,"version":"3.37.0"},"reference-count":16,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2009,11,6]]},"DOI":"10.1080\/19393550903130390","type":"journal-article","created":{"date-parts":[[2009,11,25]],"date-time":"2009-11-25T15:52:54Z","timestamp":1259164374000},"page":"199-212","source":"Crossref","is-referenced-by-count":1,"title":["An Intrusion Detection Game Theoretical Model"],"prefix":"10.1080","volume":"18","author":[{"given":"Hadi","family":"Otrok","sequence":"first","affiliation":[]},{"given":"Benwen","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Hamdi","family":"Yahyaoui","sequence":"additional","affiliation":[]},{"given":"Prabir","family":"Bhattacharya","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Alpcan, T. and Basar, T. A game theoretic approach to decision and analysis in network intrusion detection. Proceedings of the 42nd IEEE Conference on Decision and Control. Maui, HI. December, pp.2595\u20132600.","DOI":"10.1109\/CDC.2003.1273013"},{"key":"CIT0012","unstructured":"Alpcan, T. and Basar, T. A game theoretic analysis of intrusion detection in access control systems. Proceeding of the 43rd IEEE Conference on Decision and Control (CDC). December,"},{"key":"CIT0007","unstructured":"Baras, J., Radosavac, S., Theodorakopoulos, G., Sterne, D., Budulas, P. and Gopaul, R. Intrusion detection system resiliency to Byzantine attacks: The case study of wormholes in OLSR. Proceedings of Military Communications Conference. Orlando, FL. October,"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1109\/3468.867860"},{"journal-title":"Proceedings of WiOpt.","year":"2004","author":"Borkar V. S.","key":"CIT0013"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080909"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986877"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1360\/jos170463"},{"journal-title":"IEEE Wireless Communications.","year":"2008","author":"Khanna R.","key":"CIT0002"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070808"},{"volume-title":"Proceedings of the GameNets06","year":"2006","author":"Liu Y.","key":"CIT0008"},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Otrok, H., Mohammed, N., Wang, L., Debbabi, M. and Bhattacharya, P. A moderate to robust game theoretical model for intrusion detection in MANETs. Proceedings of the Fourth IEEE International conference on Wireless and Mobile Computing, Networking and Communications (Security and Privacy Workshop \u2013 SecPri-WiMob 2008). pp.608\u2013612. IEEE Press.","DOI":"10.1109\/WiMob.2008.21"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.028"},{"key":"CIT0011","unstructured":"Patchay, A. and Parky, J.M. A game theoretic approach to modeling intrusion detection in mobile ad hoc networks. Proceedings of the 2004 IEEE Workshop on Information Assurance and Security United States Military Academy. West Point, NY. June,"},{"key":"CIT0018","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A mathematical theory of evidence","author":"Shafer G.","year":"1976"},{"key":"CIT0009","volume":"27","author":"Weiping W.","year":"2006","journal-title":"Journal of Chinese Computer Systems"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393550903130390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T12:10:45Z","timestamp":1739448645000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/19393550903130390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,6]]},"references-count":16,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,11,6]]}},"alternative-id":["10.1080\/19393550903130390"],"URL":"https:\/\/doi.org\/10.1080\/19393550903130390","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2009,11,6]]}}}