{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:52:57Z","timestamp":1725954777133},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cdc.2014.7040216","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T14:53:59Z","timestamp":1424184839000},"page":"5290-5295","source":"Crossref","is-referenced-by-count":9,"title":["Role of network topology in cybersecurity"],"prefix":"10.1109","author":[{"given":"Richard J.","family":"La","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1403027.1403034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1201\/b10841","article-title":"Risk Analysis in Finance and Insurance","author":"melnikov","year":"2011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"ref14","article-title":"Prisoner's Dilemma","author":"poundstone","year":"1993","journal-title":"ANCHOR"},{"article-title":"Population Games and Evolutionary Dynamics","year":"2010","author":"sandholm","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34675-5"},{"article-title":"Information Rules","year":"1999","author":"shapiro","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_1"},{"article-title":"Evolutionary Game Theory","year":"1997","author":"weibull","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.5468"},{"article-title":"Contract Theory","year":"2004","author":"bolton","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2071397"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1287\/moor.11.1.1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040216"},{"key":"ref7","first-page":"404","article-title":"Worst-case equilibria","author":"koutsoupias","year":"1999","journal-title":"Proc 16th Ann Symp Theoretical Aspects of Computer Science (STACS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.259"},{"article-title":"The Theory of Incentives: The Principal-Agent Model","year":"2001","author":"laffont","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511760778"}],"event":{"name":"2014 IEEE 53rd Annual Conference on Decision and Control (CDC)","start":{"date-parts":[[2014,12,15]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2014,12,17]]}},"container-title":["53rd IEEE Conference on Decision and Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7027307\/7039338\/07040216.pdf?arnumber=7040216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T21:02:46Z","timestamp":1566334966000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7040216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cdc.2014.7040216","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}