{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:43:29Z","timestamp":1729629809827,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750213","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"313-320","source":"Crossref","is-referenced-by-count":1,"title":["DGM approach to network attacker and defender strategies"],"prefix":"10.1109","author":[{"given":"Alese Boniface","family":"Kayode","sequence":"first","affiliation":[]},{"given":"Iwasokun Gabriel","family":"Babatunde","sequence":"additional","affiliation":[]},{"family":"Haruna Danjuma Israel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"A game-theoretic scenario for modelling the attacker-Defenderlnteraction","volume":"2","author":"ibidunmoye","year":"2013","journal-title":"Compute J"},{"journal-title":"Game Theory 2-Two-Person Zero-Sum Games","year":"2007","author":"ferguson","key":"17"},{"key":"18","article-title":"Dispelling the myths","author":"schumacher","year":"2011","journal-title":"MySQL AB Archived from Theoriginal on 6 June 20II"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2001.946017"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/.2001.962836"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2000.904987"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2008.0019"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948135"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1190195.1190198"},{"journal-title":"Network Security A Decision and Game Theoretical Approach2010","year":"2010","author":"alpcan","key":"3"},{"journal-title":"Wing Game Strategies in Network Security","year":"2005","author":"lye","key":"2"},{"key":"1","article-title":"Network security history, importance, and future","author":"bhavya","year":"2008","journal-title":"University of Florida Department of Electrical and Computer Engineering 2008"},{"key":"10","article-title":"Game theory meets network security and privacy","author":"manshaei","year":"2010","journal-title":"EPFL Lausanne Tech Rep 201O"},{"key":"7","first-page":"209","article-title":"Application of machine learning algorithms to kDD intrusion detection dataset within misuse detection context","author":"sabhnani","year":"2003","journal-title":"International Conference on Machine LearningiModels Technologies and Applications 2003"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-17197-0_14","article-title":"Towards a game theoretic authorisation model","author":"salim","year":"2010","journal-title":"Conference on Decision and Game Theory for Security"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.39.10.1095"},{"key":"4","first-page":"1","article-title":"A survey of game theory as applied toNetwork security","volume":"0","author":"roy","year":"2010","journal-title":"Hawa2 International Conference on System Sciences"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2006.10.002"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1280940.1280965"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750213.pdf?arnumber=6750213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:27:40Z","timestamp":1498112860000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750213","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}