{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:24:59Z","timestamp":1766136299879,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/cdc.2011.6161171","type":"proceedings-article","created":{"date-parts":[[2012,3,7]],"date-time":"2012-03-07T21:18:31Z","timestamp":1331155111000},"page":"243-248","source":"Crossref","is-referenced-by-count":8,"title":["A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security"],"prefix":"10.1109","author":[{"given":"Quanyan","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Carol","family":"Fung","sequence":"additional","affiliation":[]},{"given":"Raouf","family":"Boutaba","sequence":"additional","affiliation":[]},{"given":"Tamer","family":"Basar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MSP.2005.63","article-title":"Collaborative internet worm containment","volume":"3","author":"cai","year":"2005","journal-title":"IEEE Security & Privacy"},{"key":"2","article-title":"Global intrusion detection in the domino overlay system","author":"yegneswaran","year":"0","journal-title":"NDSS'04"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"journal-title":"DShield","year":"0","author":"ullrich","key":"1"},{"journal-title":"SNORT","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031663"},{"key":"5","article-title":"Cloudav: N-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proc of the 17th USENIX Security Symp"},{"key":"4","article-title":"Trust management for host-based collaborative intrusion detection","author":"fung","year":"2008","journal-title":"19th IFIP\/IEEE International Workshop on Distributed Systems"},{"key":"9","article-title":"SMURFEN: A knowledge sharing intrusion detection network","author":"fung","year":"2011","journal-title":"Tech Rep CS-2011-06 University of Waterloo"},{"journal-title":"OSSEC","year":"0","key":"8"},{"journal-title":"Dynamic Noncooperative Game Theory","year":"1999","author":"bas?ar","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0011-7"}],"event":{"name":"2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011)","start":{"date-parts":[[2011,12,12]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2011,12,15]]}},"container-title":["IEEE Conference on Decision and Control and European Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6149620\/6159299\/06161171.pdf?arnumber=6161171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:19:40Z","timestamp":1497971980000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6161171\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cdc.2011.6161171","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}