{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:47:41Z","timestamp":1729658861765,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/crisis.2011.6061841","type":"proceedings-article","created":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T20:59:49Z","timestamp":1320181189000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Optimal voting strategy against rational attackers"],"prefix":"10.1109","author":[{"given":"Li","family":"Wang","sequence":"first","affiliation":[]},{"family":"Zheng Li","sequence":"additional","affiliation":[]},{"given":"Shangping","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Kwiaty","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/9780470400531.eorms0471"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCRD.2011.5764062"},{"key":"ref10","volume":"1","author":"kuhn","year":"1950","journal-title":"Contributions to the Theory of Games"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2010.5674867"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.832819"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(03)00084-X"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(03)00136-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.10.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.11.060"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2008.2011661"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00027-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(02)00241-7"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-5662-3","author":"vanderbei","year":"2001","journal-title":"Linear Programming Foundations and Extensions"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/12.88491"},{"key":"ref3","first-page":"3","article-title":"N-version programming: A fault-tolerance approach to reliability of software operation","author":"chen","year":"1978","journal-title":"Digest of Papers FTCS-8 Eighth Annual International Conference on Fault Tolerant Computing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(88)90014-3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774183"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/32.21731"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/800215.806583"},{"journal-title":"Linear Programming Methods and Applications","year":"1984","author":"gass","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/31846.31847"},{"key":"ref9","article-title":"A decentralized voting algorithm for increasing dependability in distributed systems","author":"hardekopf","year":"2001","journal-title":"5th World Multiconference on Systemic Cybernetics and Informatics (SCI2001"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.06.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/324634.325389"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36584-8_5"},{"key":"ref21","article-title":"Time-to-compromise model for cyber risk reduction estimation","author":"mcqueen","year":"2005","journal-title":"First Workshop on Quality of Protection"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/24.765926"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF01448847"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/320071.320076"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0005(05)80052-9"}],"event":{"name":"2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)","start":{"date-parts":[[2011,9,26]]},"location":"Timisoara, Romania","end":{"date-parts":[[2011,9,28]]}},"container-title":["2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6051620\/6061543\/06061841.pdf?arnumber=6061841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T21:25:00Z","timestamp":1560893100000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6061841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/crisis.2011.6061841","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}