{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T17:28:44Z","timestamp":1774200524519,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-19-2-0150"],"award-info":[{"award-number":["W911NF-19-2-0150"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W91NF-20-2-0140"],"award-info":[{"award-number":["W91NF-20-2-0140"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tnsm.2021.3117698","type":"journal-article","created":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T02:59:20Z","timestamp":1633489160000},"page":"112-129","source":"Crossref","is-referenced-by-count":38,"title":["Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5293-0363","authenticated-orcid":false,"given":"Zelin","family":"Wan","sequence":"first","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Falls Church, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5908-4662","authenticated-orcid":false,"given":"Jin-Hee","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Falls Church, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4303-4318","authenticated-orcid":false,"given":"Mu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8907-3043","authenticated-orcid":false,"given":"Ahmed H.","family":"Anwar","sequence":"additional","affiliation":[{"name":"Network Science Department, U.S. Army Research Laboratory, Adelphi, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2169-5975","authenticated-orcid":false,"given":"Charles A.","family":"Kamhoua","sequence":"additional","affiliation":[{"name":"Network Science Department, U.S. Army Research Laboratory, Adelphi, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3599-3893","authenticated-orcid":false,"given":"Munindar P.","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA"}]}],"member":"263","reference":[{"key":"ref39","author":"vane","year":"2000","journal-title":"Hypergame Theory for DTGT Agents"},{"key":"ref38","first-page":"1","article-title":"Advances in hypergame theory","author":"vane","year":"2006","journal-title":"AAMAS-04 Workshop on Game-Theoretic and Decision-Theoretic Agents"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/3468.867863"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/263615"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2180113"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718174"},{"key":"ref37","first-page":"41","article-title":"Modeling deception in information security as a hypergame: A primer","author":"gutierrez","year":"2015","journal-title":"Proc 16th Annu Inf Security Symp"},{"key":"ref36","author":"fraser","year":"1984","journal-title":"Conflict Analysis Models and Resolutions"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2690619"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3314058.3314063"},{"key":"ref60","article-title":"Byzantine failures and security: Arbitrary is not (always) random","author":"g\u00e4rtner","year":"2003","journal-title":"INFORMATIK&#x2014;Mit Sicherheit Informatik Schwerpunkt&#x201D; Sicherheit-Schutz und Zuverl&#x00E4;ssigkeit&#x201D;"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2005.1574347"},{"key":"ref27","first-page":"103","article-title":"Using hypergames to select plans in adversarial environments","author":"vane","year":"1999","journal-title":"Proc 1st Workshop Game Theor Decis Theor Agents"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1117\/12.852338"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32699-3_2"},{"key":"ref1","author":"sharp","year":"2006","journal-title":"Military Deception Publication 3-13 4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2019.2925681"},{"key":"ref22","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"hutchins","year":"2011","journal-title":"Leading Issues in Information Warfare & Security Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3439430"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2963791"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102288"},{"key":"ref26","author":"tadelis","year":"2013","journal-title":"Game Theory"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3016842"},{"key":"ref50","article-title":"Survey of cyber moving targets","author":"okhravi","year":"2013"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"ref59","first-page":"280","author":"teh","year":"2010","journal-title":"Dirichlet Processes"},{"key":"ref58","article-title":"Game-theoretic and machine learning-based approaches for defensive deception: A survey","author":"zhu","year":"2021","journal-title":"arXiv 2101 10121"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228653"},{"key":"ref56","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01795-7","author":"tay","year":"2010","journal-title":"Computer System Performance Modeling"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00011"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4237"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779180"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"ref10","first-page":"5","article-title":"Preservation of misperceptions&#x2014;Stability analysis of hypergames","author":"sasaki","year":"2008","journal-title":"Proc 52nd Annu Meeting ISSS"},{"key":"ref11","first-page":"47","article-title":"Intelligent poly-agent learning model and its application","volume":"2","author":"kijima","year":"1996","journal-title":"Information Systems Engineering"},{"key":"ref40","first-page":"105","article-title":"Data mining concepts and techniques","author":"han","year":"2011","journal-title":"The Morgan Kaufmann Series in Data Management Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381921"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.242"},{"key":"ref14","first-page":"1","article-title":"Optimal deceptive strategies in security games: A preliminary study","author":"yin","year":"2013","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3190836"},{"key":"ref16","first-page":"892","article-title":"Deceiving cyber adversaries: A game theoretic approach","author":"schlenker","year":"2018","journal-title":"Proc 17th Int Conf Auton Agents MultiAgent Syst"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2814052"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.94"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25594-1_16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/570639"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21236\/ADA429106"},{"key":"ref6","year":"2018","journal-title":"Foureye Butterflyfish"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0483(77)90056-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.886361"},{"key":"ref7","first-page":"49","author":"cho","year":"2019","journal-title":"Modeling and Analysis of Deception Games Based on Hypergame Theory"},{"key":"ref49","volume":"2","author":"johnson","year":"1995","journal-title":"Continuous Univariate Distributions"},{"key":"ref9","first-page":"2","article-title":"Mixed extension of hypergames and its applications to inspection games","author":"sasaki","year":"2007","journal-title":"Proc 51st Annu Meeting ISSS"},{"key":"ref46","year":"2020","journal-title":"Common Vulnerability Scoring System"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094196"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494043"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7258233"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402617"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ITC.2015.33"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9732399\/09559403.pdf?arnumber=9559403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T04:53:16Z","timestamp":1673412796000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9559403\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":60,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3117698","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}