{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:29:36Z","timestamp":1744900176912,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/cybersa.2017.8073404","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:19:08Z","timestamp":1508959148000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["A location privacy system in mobile network using game theory"],"prefix":"10.1109","author":[{"given":"Boniface K.","family":"Alese","sequence":"first","affiliation":[]},{"given":"Aderonke F.","family":"Thompson","sequence":"additional","affiliation":[]},{"given":"Patricia Yetunde","family":"Oni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"key":"ref3","article-title":"Privacy in Location-Based Social Networks: Researching the interrelatedness of scripts and usage","author":"coppens","year":"2014","journal-title":"Symposium on usable Privacy and Security (SOUPS) 2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.20533\/ijisr.2042.4639.2013.0043"},{"key":"ref6","article-title":"Mix zones for Location Privacy in Vehicular Networks","author":"freudiger","year":"2007","journal-title":"Wireless Networking for Intelligent Transportation Systems (WiN-ITS 2007"},{"journal-title":"National Science Foundation","article-title":"A Game Theoretic Approach for Achieving K-Anonymity in location based Services","year":"2013","key":"ref11"},{"key":"ref5","article-title":"A Game-theoretic Scenario for Modelling Attacker-Defender Interaction","author":"ibidunmoye","year":"2012","journal-title":"Journal of Computer Engineering and Information Technology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660270"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_13"},{"journal-title":"Network Security A Decision and Game-Theoretic Approach","year":"2010","author":"alpcan","key":"ref7"},{"key":"ref2","article-title":"Location Based Services- Positioning Techniques and its applications","volume":"3","author":"ashwini","year":"2013","journal-title":"International Journal of Application r Innovation in Engineering and Management"},{"key":"ref9","article-title":"Using Stochastic Game Theory to compute the Expected Behaviour of Attackers","author":"karin","year":"2005","journal-title":"Proceedings of the 2005 International Symposium on Applications and the Internet (SAINT 2005)"},{"key":"ref1","article-title":"Evolution of Location-based Online Social Network: Analysis and Models","author":"miltiadis","year":"2012","journal-title":"Internet Measurement Conference 2012"}],"event":{"name":"2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2017,6,19]]},"location":"London, United Kingdom","end":{"date-parts":[[2017,6,20]]}},"container-title":["2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055134\/8073382\/08073404.pdf?arnumber=8073404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T21:02:49Z","timestamp":1512075769000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8073404\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2017.8073404","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}