{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T22:20:39Z","timestamp":1771366839497,"version":"3.50.1"},"reference-count":125,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"22","license":[{"start":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T00:00:00Z","timestamp":1763164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T00:00:00Z","timestamp":1763164800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T00:00:00Z","timestamp":1763164800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,11,15]]},"DOI":"10.1109\/jiot.2025.3608507","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T17:38:44Z","timestamp":1757957924000},"page":"46417-46430","source":"Crossref","is-referenced-by-count":0,"title":["Advances in Attack\u2013Defense Game Models for IIoT: A Review"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0519-4583","authenticated-orcid":false,"given":"Fengjun","family":"Zhang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5171-739X","authenticated-orcid":false,"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7919-5743","authenticated-orcid":false,"given":"Jiahui","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[{"name":"30th Research Institute, China Electronics Technology Group Corporation, Chengdu, Sichuan, China"}]},{"given":"Lu","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9631-5363","authenticated-orcid":false,"given":"Guangcan","family":"Cui","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Qinghua","family":"Li","sequence":"additional","affiliation":[{"name":"30th Research Institute, China Electronics Technology Group Corporation, Chengdu, Sichuan, China"}]},{"given":"Kai","family":"Shi","sequence":"additional","affiliation":[{"name":"30th Research Institute, China Electronics Technology Group Corporation, Chengdu, Sichuan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991693"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GCWCN.2018.8668630"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894509"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2019.8766383"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3696014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2416984"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2824728"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s21196647"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-917-2"},{"issue":"1","key":"ref11","first-page":"161","article-title":"Cyber-physical systems","volume":"12","author":"Baheti","year":"2011","journal-title":"Impact Control Technol."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VTS-APWCS.2019.8851679"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00056"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103855"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065504"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3170347"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996671"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2995713"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2022.08.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.300"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/3417039"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9302619"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s16071003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/01605682.2019.1630332"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/07362994.2021.1993447"},{"key":"ref27","volume-title":"Finite and Infinite Games","author":"Carse","year":"1986"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2003.1236295"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2019-0152"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3080527"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2844878"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25594-1_16"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9134-5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2691326"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218444"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2024.3443174"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS59830.2024.10575184"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2670144"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1038\/364056a0"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3010289"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2948068"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3156647"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-4932.1980.tb01675.x"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CIMSim.2011.62"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719841293"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444900"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106870"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3349341.3349467"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101578"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3130944"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3138094"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3326356"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-019-00430-1"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2010.5575157"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.07.007"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/math9233014"},{"issue":"3","key":"ref58","first-page":"1","article-title":"Consensus game and consensus equilibrium in blockchain ecology","volume":"28","author":"Yuan","year":"2024","journal-title":"J. Oper. Res."},{"key":"ref59","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.future.2024.05.003","article-title":"Analyzing the blockchain mining strategy in industrial Internet of Things: A game theoretical approach","volume":"159","author":"Chen","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_17"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2764885"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-0716-0368-0_188"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-023-05792-7"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2753278"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918319"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4290"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICWR49608.2020.9122324"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7136160"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.4018\/JOEUC.20211101.oa13"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020215"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5381495"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841885"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.3758\/s13423-016-1015-8"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2024.3434593"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3406386"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7826"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2008.4525297"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.165"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2019.11.020"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00616-1"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5594697"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.17762\/ijcnis.v9i3.2579"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2016.7844690"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2020.102071"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3422870"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/1190195.1190198"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07776-3"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102138"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2861715"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3019272"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02163-8"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2009.325"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-018-0403-6"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3949292"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1362964"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2897724"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1002\/asjc.1998"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1002\/asjc.2262"},{"key":"ref99","first-page":"114","article-title":"Optimal active defense using dynamic multi-stage signaling game","volume":"12","author":"Hengwei","year":"2015","journal-title":"China Commun."},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2019.8791629"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2019.103358"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2880214"},{"key":"ref103","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121255","article-title":"Equipment classification based differential game method for advanced persistent threats in industrial Internet of Things","volume":"236","author":"Gan","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3307956"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2848242"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2961662"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02564-0"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2021.126093"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2021453"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09530-2"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871859"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48891.2023.10160875"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3452933"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3253604"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.48130\/dts-0024-0011"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3484357"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3390\/app15062914"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1360\/SSI-2022-0020"},{"key":"ref119","article-title":"Risk-sensitive Bayesian games for multi-agent reinforcement learning under policy uncertainty","author":"Eriksson","year":"2022","journal-title":"arXiv:2203.10045"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3148263"},{"key":"ref121","article-title":"Reinforcement learning, collusion, and the folk theorem","author":"Askenazi-Golan","year":"2024","journal-title":"arXiv:2411.12725"},{"key":"ref122","article-title":"Model selection for average reward RL with application to utility maximization in repeated games","author":"Masoumian","year":"2024","journal-title":"arXiv:2411.06069"},{"key":"ref123","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2023.114032","article-title":"Emergence of cooperation in two-agent repeated games with reinforcement learning","volume":"175","author":"Ding","year":"2023","journal-title":"Chaos, Solitons Fractals"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.3389\/fbioe.2022.827408"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2203\/1\/012055"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11231115\/11164516.pdf?arnumber=11164516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T21:09:54Z","timestamp":1771362594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11164516\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,15]]},"references-count":125,"journal-issue":{"issue":"22"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3608507","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,15]]}}}