{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:10:52Z","timestamp":1770815452892,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1238962"],"award-info":[{"award-number":["CNS-1238962"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"ARO MURI","doi-asserted-by":"publisher","award":["W911NF-13-1-0421"],"award-info":[{"award-number":["W911NF-13-1-0421"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tifs.2018.2819967","type":"journal-article","created":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T18:04:47Z","timestamp":1522087487000},"page":"2490-2505","source":"Crossref","is-referenced-by-count":73,"title":["A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0533-8329","authenticated-orcid":false,"given":"Erik","family":"Miehling","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Rasouli","sequence":"additional","affiliation":[]},{"given":"Demosthenis","family":"Teneketzis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2544936"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2008.IV.009"},{"key":"ref32","author":"kumar","year":"1986","journal-title":"Stochastic Systems Estimation Identification and Adaptive Control"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/0022-247X(65)90154-X"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_9"},{"key":"ref37","first-page":"353","article-title":"EMERALD: Event monitoring enabling responses to anomalous live disturbances","author":"porras","year":"1997","journal-title":"Proc 20th Nat Inf Syst Security Conf"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/65.484228"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1613\/jair.2567","article-title":"Online planning algorithms for POMDPs","volume":"32","author":"ross","year":"2008","journal-title":"J Artif Intell Res"},{"key":"ref10","first-page":"2164","article-title":"Monte-Carlo planning in large POMDPs","author":"silver","year":"2010","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012373566-9.50015-X"},{"key":"ref13","first-page":"1","article-title":"Intrusion response systems: Survey and taxonomy","volume":"12","author":"shameli-sendi","year":"2012","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.12.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233707"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932194"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.884341"},{"key":"ref18","first-page":"508","article-title":"ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment","author":"foo","year":"2005","journal-title":"Proc IEEE Int Conf Dependable Syst Netw"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2002-101-202"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140562"},{"key":"ref4","author":"etherington","year":"2016","journal-title":"Large ddos attacks cause outages at twitter spotify and other sites"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1117\/12.604240"},{"key":"ref3","author":"greenberg","year":"2016","journal-title":"Hackers remotely kill a jeep on the highway&#x2014;with me in it"},{"key":"ref6","author":"gorenc","year":"2017","journal-title":"Hacker Machine Interface The State of SCADA HMI Vulnerabilities"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029225"},{"key":"ref5","year":"2016","journal-title":"Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref7","first-page":"21","article-title":"Attack trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb&#x2019;s J"},{"key":"ref2","author":"finkle","year":"2016","journal-title":"Target Cyber Breach Hits 40 Million Payment Cards at Holiday Peak"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2017.8308695"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176302"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.824833"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_38"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808482"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.211"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2016.12"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568529"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/10206\/8356020\/8325528-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8356020\/08325528.pdf?arnumber=8325528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:51:49Z","timestamp":1649443909000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8325528\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":38,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2819967","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}