{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:11:02Z","timestamp":1774541462993,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2021,7,1]]},"DOI":"10.1109\/tcc.2019.2896632","type":"journal-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T20:46:11Z","timestamp":1548967571000},"page":"995-1007","source":"Crossref","is-referenced-by-count":30,"title":["Dynamic Resource Management to Defend Against Advanced Persistent Threats in Fog Computing: A Game Theoretic Approach"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8193-466X","authenticated-orcid":false,"given":"Shaohan","family":"Feng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4440-941X","authenticated-orcid":false,"given":"Zehui","family":"Xiong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1599-5480","authenticated-orcid":false,"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"System and method for providing financial products for a deductible portion of an insurance policy","author":"kazenas","year":"2014"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5055-3_2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.403"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2672378"},{"key":"ref31","article-title":"Organizational adoption of cyber insurance instruments in it security risk management: A modeling approach","author":"bandyopadhyay","year":"2012","journal-title":"Proc Paper"},{"key":"ref30","article-title":"Quantifying risk: Closing the chasm between cybersecurity and cyber insurance","author":"filkins","year":"2016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2475243"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/BF01213906","article-title":"Contest success functions","volume":"7","author":"stergios","year":"1996","journal-title":"Econ Theory"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262837"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2013.10.003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377068"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_12"},{"key":"ref29","article-title":"Cyber insurance","year":"2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0090-3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2700318"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.39"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2606390"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.193"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357413"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1007\/s00145-012-9134-5","article-title":"Flipit: The game of &#x201C;stealthy takeover","volume":"26","author":"marten","year":"2013","journal-title":"J Cryptology"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3108-8_5"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22261-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2876846"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2017.01.001"},{"key":"ref40","first-page":"207","article-title":"Economic policy rules for risk-sensitive decision making","volume":"44","author":"ploeg","year":"1984","journal-title":"Zeitschrift f&#x00FC;r National&#x00F6;konomie"},{"key":"ref12","article-title":"What is stuxnet, who created it and how does it work?","author":"fruhlinger","year":"2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25594-1_6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275911"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2844878"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2849984"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2611979"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2833863"},{"key":"ref4","article-title":"Healthcare provider hit by advanced persistent threat: Protecting client information","author":"micro","year":"2014"},{"key":"ref3","first-page":"1324","article-title":"Advanced persistent threats-detection and defense","author":"vukalovi?","year":"2015","journal-title":"Proc 38th Int Conv Inf Commun Technol Electron Microelectron"},{"key":"ref6","article-title":"Target profit falls 46% on credit card breach and the hits could keep on coming","author":"mcgrath","year":"2014"},{"key":"ref5","article-title":"The growing challenge of advanced persistent threats","author":"higgins","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"ref49","article-title":"Cauchy-lipschitz theorem","year":"2013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2996890.3007875"},{"key":"ref46","article-title":"Repeated games and cooperation","author":"daron","year":"2009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1006\/jeth.2000.2696"},{"key":"ref48","volume":"1","author":"bertsekas","year":"2005","journal-title":"Dynamic Programming and Optimal Control"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.insmatheco.2004.04.004"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2143\/AST.35.2.2003461"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1080\/10920277.1998.10595728"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.insmatheco.2006.01.009"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.insmatheco.2005.06.009"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/9527996\/08630504.pdf?arnumber=8630504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:45Z","timestamp":1652194425000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8630504\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":51,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2019.2896632","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"value":"2168-7161","type":"electronic"},{"value":"2372-0018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,1]]}}}