{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:55:34Z","timestamp":1775109334976,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000144","name":"National Science Foundation IGERT grant through the Center for Interdisciplinary Studies in Security and Privacy, New York University","doi-asserted-by":"publisher","award":["CNS-1544782"],"award-info":[{"award-number":["CNS-1544782"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000150","name":"National Science Foundation IGERT grant through the Center for Interdisciplinary Studies in Security and Privacy, New York University","doi-asserted-by":"publisher","award":["EFRI-1441140"],"award-info":[{"award-number":["EFRI-1441140"]}],"id":[{"id":"10.13039\/100000150","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation IGERT grant through the Center for Interdisciplinary Studies in Security and Privacy, New York University","doi-asserted-by":"publisher","award":["SES-1541164"],"award-info":[{"award-number":["SES-1541164"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"Department of Energy","doi-asserted-by":"publisher","award":["DE-NE0008571"],"award-info":[{"award-number":["DE-NE0008571"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/tifs.2017.2725224","type":"journal-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:11:38Z","timestamp":1499721098000},"page":"2906-2919","source":"Crossref","is-referenced-by-count":62,"title":["Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3970-4756","authenticated-orcid":false,"given":"Jeffrey","family":"Pawlick","sequence":"first","affiliation":[]},{"given":"Quanyan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvcm4gdk","author":"astr\u00f6m","year":"2010","journal-title":"Feedback Systems An Introduction for Scientists and Engineers"},{"key":"ref38","author":"osborne","year":"1994","journal-title":"A Course in Game Theory"},{"key":"ref33","first-page":"1191","article-title":"Cross-layer secure cyber-physical control system design for networked 3D printers","author":"xu","year":"2016","journal-title":"Proc Amer Control Conf (ACC)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659418"},{"key":"ref31","first-page":"1","article-title":"Deception by design: Evidence-based signaling games for network defense","author":"pawlick","year":"2015","journal-title":"Proc Workshop Econ Inform Secur"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2084571"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1215\/S0012-7094-41-00838-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2307\/1885060"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.36.1.48"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888904000116"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.63"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/jsan1030217"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan1030217"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/978-3-642-34266-0_15","article-title":"Defending against the unknown enemy: Applying Flipit to system security","author":"bowers","year":"2012","journal-title":"Decision and Game Theory for Security"},{"key":"ref22","volume":"393","author":"fudenberg","year":"1991","journal-title":"Game Theory"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9134-5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/978-3-319-04483-5_4","article-title":"Cyber security via signaling games: Toward a science of cyber security","volume":"8337","author":"casey","year":"2014","journal-title":"Distributed Computing and Internet Technology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2013.2296516"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918931"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056602"},{"key":"ref11","first-page":"125","article-title":"Deployed ARMOR protection: The application of a game theoretic model for security at the Los Angeles international airport","author":"pita","year":"2008","journal-title":"Proc Ind Track 4th Int Joint Conf Auton Agents Multiagent Syst"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.diabres.2013.11.002"},{"key":"ref12","first-page":"13","article-title":"Protect: A deployed game theoretic system to protect the ports of the United States","volume":"1","author":"shieh","year":"2012","journal-title":"Proc 11th Int Conf Auton Agents Multiagent Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511614934"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355124"},{"key":"ref16","first-page":"289","article-title":"Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats","author":"pawlick","year":"2015","journal-title":"International Journal of Game Theory"},{"key":"ref17","year":"2017","journal-title":"Gestalten"},{"key":"ref18","year":"2017","journal-title":"Fitbit Official Site for Activity Trackers & More"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.187"},{"key":"ref4","first-page":"161","article-title":"Cyber-physical systems","volume":"12","author":"baheti","year":"2011","journal-title":"The Impact of Control Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071007"},{"key":"ref6","article-title":"Managing information security risk: Organization, mission, and information system view","year":"2011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2003.1273013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70086-1"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/BF00252409"},{"key":"ref9","first-page":"644","article-title":"Secure and resilient distributed machine learning under adversarial environments","author":"zhang","year":"2015","journal-title":"Proc IEEE Int Conf Inform Fusion"},{"key":"ref46","year":"2012","journal-title":"Shoppingfor Zero Days A Price Listfor Hackers&#x2019; Secret Software Exploits"},{"key":"ref45","year":"2016","journal-title":"Facebook Bug Bounty $5 Million Paid in 5 Years"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1530\/acta.0.1010414"},{"key":"ref47","year":"2015","journal-title":"11 Essential Bug Bounty Programs of 2015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1172\/JCI110398"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"14s","DOI":"10.2337\/dc14-S014","article-title":"Standards of medical care in diabetes&#x2014;2014","volume":"37","year":"2014","journal-title":"Diabetes Care"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/03091900410001662332"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/10206\/8017695\/7972976-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8017695\/07972976.pdf?arnumber=7972976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:51:54Z","timestamp":1649443914000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7972976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":49,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2725224","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}