{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:55:55Z","timestamp":1729641355697,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/gamenets.2009.5137461","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T11:05:14Z","timestamp":1246446314000},"page":"683-690","source":"Crossref","is-referenced-by-count":0,"title":["Towards behavioral control in multi-player network games"],"prefix":"10.1109","author":[{"given":"Andrey","family":"Lukyanenko","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176986"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.858449"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176273"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159948"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/90.477727"},{"key":"16","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/ICNP.2002.1181417","article-title":"ip traceback-based intelligent packet filtering: a novel technique for defending against internet ddos attacks","author":"sung","year":"2002","journal-title":"ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols"},{"key":"13","first-page":"697","article-title":"adjusted probabilistic packet marking for ip traceback","author":"peng","year":"2002","journal-title":"NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies Services and Protocols Performance of Computer and Communication Networks and Mobile and Wireless Communications"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863974"},{"key":"11","article-title":"equilibrium in a p2p-system","author":"mazalov","year":"2007","journal-title":"Proc of AMICT'07"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.40"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571723"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842221"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1016527.1016539"},{"key":"1","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/964725.633037","article-title":"selfish behavior and stability of the internet: a game-theoretic analysis of tcp","volume":"32","author":"akella","year":"2002","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.18"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.114"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"},{"year":"0","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/586110.586128","article-title":"efficient packet marking for large-scale ip traceback","author":"goodrich","year":"2002","journal-title":"CCS '02 Proceedings of the 9th ACM conference on Computer and communications security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053288"},{"journal-title":"SAVE Source address validity enforcement protocol","year":"2001","author":"li","key":"8"}],"event":{"name":"2009 International Conference on Game Theory for Networks (GameNets)","start":{"date-parts":[[2009,5,13]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2009,5,15]]}},"container-title":["2009 International Conference on Game Theory for Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5076471\/5137364\/05137461.pdf?arnumber=5137461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T17:28:37Z","timestamp":1497806917000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5137461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/gamenets.2009.5137461","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}