{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:11:03Z","timestamp":1753884663567,"version":"3.41.2"},"reference-count":17,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03","funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["CNS-1909186","ECCS-2128451"],"award-info":[{"award-number":["CNS-1909186","ECCS-2128451"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. Game Theory Rev."],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:p> Scanning a large bandwidth of radio spectrum for anomalous signals is a fundamental challenge that must be addressed in building a secure spectrum sharing system. When designing a bandwidth scanning algorithm, the system engineer faces a problem of which band to scan and how long to scan each band. Traditionally, in such a problem, the adversary is considered as one who wants to achieve a malicious goal, e.g., to sneak usage of a particular band while being undetected. In this paper, we deal with a new type of adversary, called a sophisticated adversary, who, besides the basic goal of being malicious and undetected, also has a secondary goal to achieve the basic goal in the most unpredictable way. As a metric for such unpredictability we consider the entropy associated with the adversary\u2019s strategy. The problem is modeled by a two-player game between an Intrusion Detection System (IDS) and the adversary. The equilibrium is found in closed form. Finally, weighting coefficients for the basic and secondary goals of the adversary are optimized via proportional fairness criteria. <\/jats:p>","DOI":"10.1142\/s0219198923400029","type":"journal-article","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T03:42:33Z","timestamp":1683258153000},"source":"Crossref","is-referenced-by-count":0,"title":["A Bandwidth Scanning Game with a Sophisticated Adversary"],"prefix":"10.1142","volume":"25","author":[{"given":"Andrey","family":"Garnaev","sequence":"first","affiliation":[{"name":"WINLAB, Rutgers University, 671 US-1, North Brunswick, NJ 08902, USA"}]},{"given":"Wade","family":"Trappe","sequence":"additional","affiliation":[{"name":"WINLAB, Rutgers University, 671 US-1, North Brunswick, NJ 08902, USA"}]}],"member":"219","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"S0219198923400029BIB001","first-page":"2414","volume-title":"47th IEEE Conf. Decision and Control ( CDC)","author":"Altman E.","year":"2008"},{"key":"S0219198923400029BIB002","first-page":"1","volume-title":"IEEE Int. Conf. Information Reuse and Integration (IRI)","author":"Anindya I. C.","year":"2018"},{"key":"S0219198923400029BIB003","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1002\/(SICI)1520-6750(200003)47:2<85::AID-NAV1>3.0.CO;2-C","volume":"47","author":"Baston V. J.","year":"2000","journal-title":"Naval Res. Log."},{"key":"S0219198923400029BIB004","first-page":"1","volume-title":"Int. Conf. Inventive Computation Technologies (ICICT)","author":"Belavagi M. C.","year":"2016"},{"volume-title":"A Wireless Networks Multiuser Detection in Cross-Layer Design","year":"2005","author":"Comaniciu C.","key":"S0219198923400029BIB005"},{"key":"S0219198923400029BIB006","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1002\/nav.3800220117","volume":"22","author":"Croucher J. S.","year":"1975","journal-title":"Naval Res. Log. Quart."},{"key":"S0219198923400029BIB007","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1109\/TIFS.2015.2510959","volume":"11","author":"Garnaev A.","year":"2016","journal-title":"IEEE Trans. Inform. Forensics Security"},{"key":"S0219198923400029BIB008","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/TIFS.2017.2694766","volume":"12","author":"Garnaev A.","year":"2017","journal-title":"IEEE Trans. Inform. Forensics Security"},{"key":"S0219198923400029BIB009","first-page":"72","volume-title":"56th Annual Conf. Information Sciences and Systems (CISS)","author":"Garnaev A.","year":"2022"},{"key":"S0219198923400029BIB010","first-page":"287","volume":"37","author":"Iida K.","year":"1994","journal-title":"J. Oper. Res. Soc. Japan"},{"volume-title":"Search and Screening General Principles with Historical Applications","year":"1980","author":"Koopman B. O.","key":"S0219198923400029BIB011"},{"key":"S0219198923400029BIB012","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1137\/S1052623496303470","volume":"9","author":"Lagarias J. C.","year":"1998","journal-title":"SIAM J. Opt."},{"key":"S0219198923400029BIB013","first-page":"326","volume-title":"First IEEE Int. Conf. Ubi-Media Computing","author":"Ma Y.","year":"2008"},{"key":"S0219198923400029BIB014","first-page":"1","volume-title":"Int. Conf. Computing, Communication and Networking","author":"Poongothai T.","year":"2008"},{"key":"S0219198923400029BIB015","first-page":"979","volume":"32","author":"Sakaguchi M.","year":"1987","journal-title":"Math. Japon."},{"volume-title":"Theory of Optimal Search","year":"1976","author":"Stone L. D.","key":"S0219198923400029BIB016"},{"key":"S0219198923400029BIB017","first-page":"7133","volume-title":"IEEE 51st Conf. Decision and Control (CDC)","author":"Vamvoudakis K. G.","year":"2012"}],"container-title":["International Game Theory Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219198923400029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T04:09:29Z","timestamp":1690949369000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219198923400029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,31]]},"references-count":17,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10.1142\/S0219198923400029"],"URL":"https:\/\/doi.org\/10.1142\/s0219198923400029","relation":{},"ISSN":["0219-1989","1793-6675"],"issn-type":[{"type":"print","value":"0219-1989"},{"type":"electronic","value":"1793-6675"}],"subject":[],"published":{"date-parts":[[2023,5,31]]},"article-number":"2340002"}}