{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:37:04Z","timestamp":1767109024317,"version":"3.37.3"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ONR","award":["N00014-16-1-2710 P00002"],"award-info":[{"award-number":["N00014-16-1-2710 P00002"]}]},{"name":"DARPA TC","award":["DARPA FA8650-15-C-7556"],"award-info":[{"award-number":["DARPA FA8650-15-C-7556"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Contr."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1109\/tac.2020.2976040","type":"journal-article","created":{"date-parts":[[2020,2,24]],"date-time":"2020-02-24T22:02:57Z","timestamp":1582581777000},"page":"5248-5263","source":"Crossref","is-referenced-by-count":32,"title":["A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats"],"prefix":"10.1109","volume":"65","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6091-2384","authenticated-orcid":false,"given":"Shana","family":"Moothedath","sequence":"first","affiliation":[]},{"given":"Dinuka","family":"Sahabandu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5503-4123","authenticated-orcid":false,"given":"Joey","family":"Allen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5868-6186","authenticated-orcid":false,"given":"Andrew","family":"Clark","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8751-2409","authenticated-orcid":false,"given":"Linda","family":"Bushnell","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2761-1277","authenticated-orcid":false,"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0269-8097","authenticated-orcid":false,"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792480"},{"key":"ref2","first-page":"1","article-title":"Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Newsome","year":"2005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1037187.1024404"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134045"},{"key":"ref5","first-page":"1705","article-title":"Enabling refinable cross-host attack investigation with efficient data flow tagging and tracking","volume-title":"Proc. USENIX Secur. Symp.","author":"Ji","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511760778","volume-title":"Network Security: A Decision and Game-Theoretic Approach","author":"Alpcan","year":"2010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9134-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7402926"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2844878"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168675"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218444"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619416"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_5"},{"key":"ref17","first-page":"1","article-title":"Cross site scripting prevention with dynamic data tainting and static analysis","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Vogt","year":"2007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.36.1.48"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1516512.1516516"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/130929205"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1287\/opre.41.2.338"},{"article-title":"A game theoretic approach for dynamic information flow tracking to detect multi-stage advanced persistent threats","year":"2018","author":"Moothedath","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1379759.1379762"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/1911154"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546921"}],"container-title":["IEEE Transactions on Automatic Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9\/9277906\/09007765.pdf?arnumber=9007765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:39:44Z","timestamp":1706056784000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9007765\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":25,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tac.2020.2976040","relation":{},"ISSN":["0018-9286","1558-2523","2334-3303"],"issn-type":[{"type":"print","value":"0018-9286"},{"type":"electronic","value":"1558-2523"},{"type":"electronic","value":"2334-3303"}],"subject":[],"published":{"date-parts":[[2020,12]]}}}