{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:22:38Z","timestamp":1730305358606,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/wimob.2019.8923484","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T07:28:23Z","timestamp":1575617303000},"page":"360-365","source":"Crossref","is-referenced-by-count":0,"title":["Game theoretic framework for cyber-physical system security incorporating bounded rationality"],"prefix":"10.1109","author":[{"given":"Ziming","family":"Zhu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/0-387-24244-9_9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TCOMM.2012.031912.110179"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proceedings of the IEEE"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/JPROC.2011.2165269"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/CPSRSG.2016.7684101"},{"year":"1999","author":"dutta","journal-title":"Strategies and Games Theory and Practice","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1017\/CBO9780511895043"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/SURV.2012.111412.00167"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/MSP.2009.933496"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ISRCS.2011.6016081"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/LSP.2009.2022146"},{"key":"ref4","first-page":"731","article-title":"Cyber-physical systems: The next computing revolution","author":"rajkumar","year":"2010","journal-title":"Design Automation Conference"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/s11633-008-0063-6"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/JPROC.2011.2160929"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1073\/pnas.1618130114"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/BF01448847"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MWC.2011.5751298"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ISRCS.2013.6623750"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TAC.2013.2266831"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/WCSP.2011.6096958"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/JPROC.2014.2371999"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JIOT.2014.2312291"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1073\/pnas.36.1.48"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.2307\/1884852"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.2307\/1969529"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-3-319-26485-1_2"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4702.001.0001","author":"rubinstein","year":"1998","journal-title":"Modeling Bounded Rationality"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1007\/978-3-319-66104-9"},{"year":"2009","author":"russell","journal-title":"Artificial Intelligence A Modern Approach","key":"ref25"}],"event":{"name":"2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2019,10,21]]},"location":"Barcelona, Spain","end":{"date-parts":[[2019,10,23]]}},"container-title":["2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8913409\/8923119\/08923484.pdf?arnumber=8923484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:49:08Z","timestamp":1658094548000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8923484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/wimob.2019.8923484","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}