{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:47:04Z","timestamp":1774716424198,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory and was accomplished under Cooperative Agreement","doi-asserted-by":"publisher","award":["W911NF-19-2-0150"],"award-info":[{"award-number":["W911NF-19-2-0150"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office under Grant Contract Numbers","doi-asserted-by":"publisher","award":["W911NF-20-2-0140"],"award-info":[{"award-number":["W911NF-20-2-0140"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office under Grant Contract Numbers","doi-asserted-by":"publisher","award":["W911NF-17-1-0370"],"award-info":[{"award-number":["W911NF-17-1-0370"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1109\/tnsm.2023.3240366","type":"journal-article","created":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T18:49:30Z","timestamp":1675795770000},"page":"3816-3830","source":"Crossref","is-referenced-by-count":12,"title":["Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5293-0363","authenticated-orcid":false,"given":"Zelin","family":"Wan","sequence":"first","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Falls Church, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5908-4662","authenticated-orcid":false,"given":"Jin-Hee","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, Falls Church, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4303-4318","authenticated-orcid":false,"given":"Mu","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8907-3043","authenticated-orcid":false,"given":"Ahmed H.","family":"Anwar","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory, Adelphi, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2169-5975","authenticated-orcid":false,"given":"Charles A.","family":"Kamhoua","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory, Adelphi, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3599-3893","authenticated-orcid":false,"given":"Munindar P.","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3117698"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.303"},{"key":"ref12","first-page":"41","article-title":"Modeling deception in information security as a hypergame: A primer","author":"gutierrez","year":"2015","journal-title":"Proc 16th Annu Inf Security Symp"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2016.7797341"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.886361"},{"key":"ref59","first-page":"17","article-title":"On the evolution of random graphs","author":"erd\u00f6s","year":"1960","journal-title":"Publications of the Mathematical Institute of the Hungarian Academy of Sciences"},{"key":"ref14","article-title":"Survey of cyber moving targets techniques","author":"okhravi","year":"1166"},{"key":"ref58","author":"breiman","year":"1984","journal-title":"Classification and Regression Trees"},{"key":"ref53","first-page":"280","article-title":"Dirichlet process","author":"teh","year":"2010","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref52","first-page":"1","article-title":"Advances in hypergame theory","author":"vane","year":"2006","journal-title":"AAMAS-04 Workshop on Game-Theoretic and Decision-Theoretic Agents"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3314058.3314063"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228653"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_22"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32430-8_2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2814052"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34266-0_12"},{"key":"ref18","article-title":"Deception by design: Evidence-based signaling games for network defense","author":"pawlick","year":"2015","journal-title":"arXiv 1503 05458"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779180"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"ref46","article-title":"Survey of cyber moving targets second edition","author":"ward","year":"1228"},{"key":"ref45","article-title":"Byzantine failures and security: Arbitrary is not (always) random","author":"g\u00e4rtner","year":"2003"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_5"},{"key":"ref47","author":"bodmer","year":"2012","journal-title":"Reverse Deception-Organized Cyber Threat Counter-Exploitation"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094196"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06400-0"},{"key":"ref44","year":"2021","journal-title":"Common Vulnerability Scoring System Version 3 1"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/2998573"},{"key":"ref7","first-page":"163","article-title":"Hypergame theory for DTGT agents","author":"vane","year":"2000","journal-title":"Proc AAAI Conf"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168675"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3102874"},{"key":"ref3","first-page":"82","article-title":"A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy","volume":"52","author":"pawlick","year":"2019","journal-title":"ACM Comput Surveys"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0483(77)90056-1"},{"key":"ref5","author":"tadelis","year":"2013","journal-title":"Game Theory"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21236\/ADA550373"},{"key":"ref35","first-page":"289","volume":"2","author":"johnson","year":"1995","journal-title":"Continuous Univariate Distributions"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5373747"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.21"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0197-3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.48"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA429106"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32699-3_2"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.21236\/ADA367718"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.43"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2019.2925681"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3439430"},{"key":"ref67","year":"2021","journal-title":"Deception defense and threat awareness system"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC49849.2020.9238808"},{"key":"ref25","first-page":"49","author":"cho","year":"2019","journal-title":"Modeling and Analysis of Deception Games Based on Hypergame Theory"},{"key":"ref20","first-page":"7","article-title":"Planning for terrorist-caused emergencies","author":"vane","year":"2005","journal-title":"Winter Simulation Conference Proceedings"},{"key":"ref64","year":"2021","journal-title":"What is a Honeypot?"},{"key":"ref63","first-page":"1","article-title":"Mixed extension of hypergames and its applications to inspection games","author":"sasaki","year":"2007","journal-title":"Proc 51st Annu Meeting"},{"key":"ref22","first-page":"103","article-title":"Using hypergames to select plans in adversarial environments","author":"vane","year":"1999","journal-title":"Proc 1st Workshop Game Theor Decis Theor Agents"},{"key":"ref66","year":"2021","journal-title":"360 defensive deception system"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1117\/12.852338"},{"key":"ref65","year":"2021","journal-title":"Make the world safer and better"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2550218"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/risa.13257"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2907946"},{"key":"ref60","author":"wan","year":"2023","journal-title":"Foureye-2-simulation"},{"key":"ref62","first-page":"47","article-title":"Intelligent poly-agent learning model and its application","volume":"2","author":"kijima","year":"1996","journal-title":"Inf Syst Eng"},{"key":"ref61","first-page":"1","article-title":"Preservation of misperceptions&#x2014;Stability analysis of hypergames","author":"sasaki","year":"2008","journal-title":"Proc 52nd Annu Meeting"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10274602\/10040491.pdf?arnumber=10040491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T19:06:51Z","timestamp":1698692811000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10040491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":67,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2023.3240366","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]}}}