{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:00:42Z","timestamp":1772301642064,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSF","award":["CNS-1901057"],"award-info":[{"award-number":["CNS-1901057"]}]},{"name":"ONR","award":["N00014-17-1-2417"],"award-info":[{"award-number":["N00014-17-1-2417"]}]},{"DOI":"10.13039\/100000774","name":"Defense Threat Reduction Agency","doi-asserted-by":"publisher","award":["HDTRA1-14-1-0058"],"award-info":[{"award-number":["HDTRA1-14-1-0058"]}],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Control Netw. Syst."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1109\/tcns.2020.2993281","type":"journal-article","created":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T19:58:44Z","timestamp":1588967924000},"page":"1665-1677","source":"Crossref","is-referenced-by-count":12,"title":["Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6412-8730","authenticated-orcid":false,"given":"Ming","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4799-1051","authenticated-orcid":false,"given":"Zizhan","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4606-6879","authenticated-orcid":false,"given":"Ness B.","family":"Shroff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.2993281"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3084450"},{"key":"ref31","first-page":"728","article-title":"Non-additive security games","author":"wang","year":"2017","journal-title":"Proc 31st AAAI Conf Artif Intell"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9134-5"},{"key":"ref35","first-page":"3679","article-title":"When to reset your keys: Optimal timing of security updates via learning","author":"zheng","year":"2017","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25594-1_6"},{"key":"ref10","article-title":"Open letter to RSA customers","author":"coviello","year":"2011"},{"key":"ref11","author":"alpcan","year":"2010","journal-title":"Network Security A Decision and Game-Theoretic Approach"},{"key":"ref12","first-page":"1","article-title":"Security games with surveillance cost and optimal timing of attack execution","author":"an","year":"0","journal-title":"Proc 1st Int Conf Autonomous Agents Multiagent Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/fi4040971"},{"key":"ref14","article-title":"Graph-based approach to deterring persistent security threats","author":"bowers","year":"2014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34266-0_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35582-0_20"},{"key":"ref17","article-title":"Defender (Mis)coordination in security games","author":"jiang","year":"0","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1613\/jair.3269"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"key":"ref28","first-page":"895","article-title":"Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games","author":"paruchuri","year":"0","journal-title":"Proc 1st Int Conf Autonomous Agents Multiagent Syst"},{"key":"ref4","year":"2019"},{"key":"ref27","author":"osborne","year":"1994","journal-title":"A Course in Game Theory"},{"key":"ref3","year":"2019"},{"key":"ref6","year":"2019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031"},{"key":"ref5","year":"2019"},{"key":"ref8","article-title":"Advanced persistent threat","year":"0"},{"key":"ref7","year":"2019"},{"key":"ref2","year":"0"},{"key":"ref9","year":"2013","journal-title":"ESET and Sucuri Uncover Linux\/Cdorked A The Most Sophisticated Apache Backdoor"},{"key":"ref1","year":"2018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12601-2_10"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25594-1_5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45046-4_26"},{"key":"ref24","article-title":"Game theory meets network security and privacy","volume":"45","author":"manshaei","year":"2012","journal-title":"ACM Comput Surv"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_10"},{"key":"ref26","first-page":"93","article-title":"A behavioral investigation of the FlipIt game","author":"nochenson","year":"0","journal-title":"Proc 12th Workshop Econ Inf Secur"},{"key":"ref25","first-page":"718","article-title":"Analyzing the effectiveness of adversary modeling in security games","author":"nguyen","year":"2013","journal-title":"Proc AAAI Conf Artif Intell"}],"container-title":["IEEE Transactions on Control of Network Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6509490\/9296408\/9090276-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6509490\/9296408\/09090276.pdf?arnumber=9090276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:29:53Z","timestamp":1651080593000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9090276\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":35,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcns.2020.2993281","relation":{},"ISSN":["2325-5870","2372-2533"],"issn-type":[{"value":"2325-5870","type":"electronic"},{"value":"2372-2533","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]}}}