{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:08:00Z","timestamp":1774022880779,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1718637"],"award-info":[{"award-number":["CNS-1718637"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Control Netw. Syst."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/tcns.2019.2897904","type":"journal-article","created":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T19:48:26Z","timestamp":1549482506000},"page":"1461-1472","source":"Crossref","is-referenced-by-count":56,"title":["Game-Theoretic Vaccination Against Networked SIS Epidemics and Impacts of Human Decision-Making"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0562-0594","authenticated-orcid":false,"given":"Ashish R.","family":"Hota","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5390-2505","authenticated-orcid":false,"given":"Shreyas","family":"Sundaram","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2691605"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2408598"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2814052"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659418"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2015.2488636"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.021214.130472"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2019.01.057"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1038\/srep44122"},{"key":"ref35","article-title":"The impact of imitation on vaccination behavior in social contact networks","volume":"8","author":"mbah","year":"2012","journal-title":"PLoS Comput Biol"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2010.1107"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2007.08.001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925623"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.07.037"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2719585"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2310911"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2747840"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852362"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2015.2495000"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062065"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2797217"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2016.0792"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2520760"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2600484"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2017.09.008"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2352335"},{"key":"ref5","article-title":"Impacts of game-theoretic and behavioral decision-making on the robustness and security of shared systems and networks","author":"hota","year":"2017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144500371907"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996862"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.87.925"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70230"},{"key":"ref1","author":"alpcan","year":"2010","journal-title":"Network Security A Decision and Game-Theoretic Approach"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2209949"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.036104"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2015.2426755"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0403823101"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2307\/2998573"},{"key":"ref24","author":"dhami","year":"2016","journal-title":"Foundations of Behavioral Economic Analysis"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/BF00122574"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"ref44","author":"sandholm","year":"2010","journal-title":"Population Games and Evolutionary Dynamics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2016.06.003"},{"key":"ref43","article-title":"Lectures on network systems","author":"bullo","year":"2016","journal-title":"Draft of a book"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1257\/jep.27.1.173"}],"container-title":["IEEE Transactions on Control of Network Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6509490\/8935458\/8636162-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6509490\/8935458\/08636162.pdf?arnumber=8636162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:07:46Z","timestamp":1657746466000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8636162\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":45,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcns.2019.2897904","relation":{},"ISSN":["2325-5870","2372-2533"],"issn-type":[{"value":"2325-5870","type":"electronic"},{"value":"2372-2533","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]}}}