{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T03:55:30Z","timestamp":1768622130837,"version":"3.49.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cybersa.2015.7166127","type":"proceedings-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T17:18:14Z","timestamp":1438017494000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Cyber security: A game-theoretic analysis of defender and attacker strategies in defacing-website games"],"prefix":"10.1109","author":[{"given":"Palvi","family":"Aggarwal","sequence":"first","affiliation":[]},{"given":"Zahid","family":"Maqbool","sequence":"additional","affiliation":[]},{"given":"Antra","family":"Grover","sequence":"additional","affiliation":[]},{"given":"V. S. Chandrasekhar","family":"Pammi","sequence":"additional","affiliation":[]},{"given":"Saumya","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Varun","family":"Dutt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Cyber Situation Awareness: Rational Methods versus Instance-Based Learning Theory for Cyber Threat Detection","author":"kanaparthi","year":"2013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/0018720812464045"},{"key":"ref10","first-page":"44","article-title":"GARNET: A graphical attack graph and reachability network evaluation tool","author":"williams","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0060-x"},{"key":"ref5","article-title":"Cyber Situation Awareness: Modeling the Effects of Similarity and Scenarios on Cyber Attack Detection","author":"kaur","year":"2013","journal-title":"Paper presented at the 12th International Conference on Cognitive Modeling"},{"key":"ref8","article-title":"The Hindu","year":"2014","journal-title":"As Cyber attacks rise government sounds alert Report retrieved on"},{"key":"ref7","first-page":"1","volume":"4","author":"sutton","year":"1998"},{"key":"ref2","article-title":"Reinforcement learning: An introduction","author":"barto","year":"1998"},{"key":"ref9","article-title":"Times (2014) Germany confirms 18 million email accounts compromised","year":"2014"},{"key":"ref1","article-title":"Cyber Security: Evaluating the Effects of Attack Strategy and Base Rate through InstanceBased Learning","author":"arora","year":"2013","journal-title":"Paper presented at the 12th International Conference on Cognitive Modeling"}],"event":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","location":"London, United Kingdom","start":{"date-parts":[[2015,6,8]]},"end":{"date-parts":[[2015,6,9]]}},"container-title":["2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153065\/7166109\/07166127.pdf?arnumber=7166127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T01:39:57Z","timestamp":1490405997000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7166127\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2015.7166127","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}