{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T22:11:08Z","timestamp":1725401468105},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iccomm.2014.6866663","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T21:12:11Z","timestamp":1406754731000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Applied cybersecurity using game theory elements"],"prefix":"10.1109","author":[{"given":"Alecsandru","family":"Patrascu","sequence":"first","affiliation":[]},{"given":"Emil","family":"Simion","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Zero Day Initiative","year":"2014","key":"3"},{"journal-title":"United States Computer Emergency Readiness Team","year":"2014","key":"2"},{"journal-title":"The Art of Computer Programming Seminumerical Algorithms","year":"1998","author":"knuth","key":"10"},{"journal-title":"Software Tools for Game Theory","year":"2014","key":"1"},{"journal-title":"Flame Malware Makers Send Suicide Code","year":"2014","key":"7"},{"journal-title":"Flame Report","year":"2014","key":"6"},{"year":"2014","key":"5"},{"journal-title":"SKyWIper A Complex Malware for Targeted Attacks","year":"2014","key":"4"},{"journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","year":"2010","key":"9"},{"journal-title":"BackTrack Linux Distribution","year":"2014","key":"8"},{"journal-title":"DIEHARD Statistical Tests","year":"2014","author":"marsaglia","key":"11"},{"journal-title":"The Basics of Hacking and Penetration Testing","year":"2012","author":"engebretson","key":"12"}],"event":{"name":"2014 10th International Conference on Communications (COMM)","start":{"date-parts":[[2014,5,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,5,31]]}},"container-title":["2014 10th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6856368\/6866648\/06866663.pdf?arnumber=6866663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:11:07Z","timestamp":1490303467000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2014.6866663","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}