{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:42:19Z","timestamp":1762004539110,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T00:00:00Z","timestamp":1369785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,29]]},"DOI":"10.1145\/2504335.2504350","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T12:23:54Z","timestamp":1382012634000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Detecting intrusive activities from insiders in a wireless sensor network using game theory"],"prefix":"10.1145","author":[{"given":"Ioanna","family":"Kantzavelou","sequence":"first","affiliation":[{"name":"Institute of Athens, Athens, Greece"}]},{"given":"Panagiotis F.","family":"Tzikopoulos","sequence":"additional","affiliation":[{"name":"University of Piraeus, Pireaus, Greece"}]},{"given":"Sokratis K.","family":"Katsikas","sequence":"additional","affiliation":[{"name":"University of Piraeus, Pireaus, Greece"}]}],"member":"320","published-online":{"date-parts":[[2013,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"the 1st International Workshop on Wireless Information System (WIS 2002) Proceedings","author":"Albers P.","year":"2002","unstructured":"Albers , P. , O. Camp , J. Percher , B. Jouga , L. M\u00e9 , and P. R. Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches . In the 1st International Workshop on Wireless Information System (WIS 2002) Proceedings , April 2002 . Albers, P., O. Camp, J. Percher, B. Jouga, L. M\u00e9, and P. R. Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approaches. In the 1st International Workshop on Wireless Information System (WIS 2002) Proceedings, April 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1140563.1140567"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.194"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780195300574.001.0001","volume-title":"Playing for Real - A Text on Game Theory","author":"Binmore K.","year":"2007","unstructured":"Binmore , K. Playing for Real - A Text on Game Theory . Oxford University Press , 2007 . Binmore, K. Playing for Real - A Text on Game Theory. Oxford University Press, 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354529"},{"key":"e_1_3_2_1_6_1","volume-title":"Games of Strategy","author":"Dixit A.","year":"1999","unstructured":"Dixit , A. and S. Skeath . Games of Strategy . W. W. Norton & Company, Inc. , 1999 . Dixit, A. and S. Skeath. Games of Strategy. W. W. Norton & Company, Inc., 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1274858.1274860"},{"key":"e_1_3_2_1_9_1","first-page":"97","volume-title":"the First European Conference on Computer Network Defence (EC2ND 2005","author":"Han S.","year":"2005","unstructured":"Han , S. , E. Chang , L. Gao , and T. Dillon . Taxonomy of attacks on wireless sensor networks . In the First European Conference on Computer Network Defence (EC2ND 2005 ), pages 97 -- 105 . Andrew Blyth (ed.), University of Glamorgan , 2005 . Han, S., E. Chang, L. Gao, and T. Dillon. Taxonomy of attacks on wireless sensor networks. In the First European Conference on Computer Network Defence (EC2ND 2005), pages 97--105. Andrew Blyth (ed.), University of Glamorgan, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"e_1_3_2_1_12_1","first-page":"60","volume-title":"the 7th International Workshop on Information Security Applications (WISA'06)","author":"Ma J.","year":"2006","unstructured":"Ma , J. , S. Zhang , Y. Zhong , and X. Tong . SAID: A self-adaptive intrusion detection system in wireless sensor networks . In the 7th International Workshop on Information Security Applications (WISA'06) , pages 60 -- 73 , August 2006 . Ma, J., S. Zhang, Y. Zhong, and X. Tong. SAID: A self-adaptive intrusion detection system in wireless sensor networks. In the 7th International Workshop on Information Security Applications (WISA'06), pages 60--73, August 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gaceta.2008.07.003"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102238"},{"key":"e_1_3_2_1_15_1","volume-title":"January","author":"McKelvey D.","year":"2007","unstructured":"McKelvey , Richard D. , A. M. McLennan , and T. L. Turocy . Gambit: Software tools for game theory, version 0.2007.01.30 , January 2007 . accessed 20\/1\/2010, http:\/\/www.gambit-project.org. McKelvey, Richard D., A. M. McLennan, and T. L. Turocy. Gambit: Software tools for game theory, version 0.2007.01.30, January 2007. accessed 20\/1\/2010, http:\/\/www.gambit-project.org."},{"key":"e_1_3_2_1_16_1","volume-title":"the Innovations and Commercial Applications of Distributed Sensor Networks Symposium (ICA DSN 05)","author":"Pirretti M.","year":"2005","unstructured":"Pirretti , M. , S. Zhu , V. Narayanan , P. McDaniel , M. Kandemir , and R. Brooks . The sleep deprivation attack in sensor networks: Analysis and methods of defense . In the Innovations and Commercial Applications of Distributed Sensor Networks Symposium (ICA DSN 05) , October 2005 . Pirretti, M., S. Zhu, V. Narayanan, P. McDaniel, M. Kandemir, and R. Brooks. The sleep deprivation attack in sensor networks: Analysis and methods of defense. In the Innovations and Commercial Applications of Distributed Sensor Networks Symposium (ICA DSN 05), October 2005."},{"key":"e_1_3_2_1_17_1","first-page":"239","volume-title":"2006 IEEE International Conference on","author":"Sha K.","year":"2006","unstructured":"Sha , K. , W. Shi , and O. Watkins . Using wireless sensor networks for fire rescue applications: Requirements and challenges. In Electro\/information Technology , 2006 IEEE International Conference on , pages 239 -- 244 , 2006 . Sha, K., W. Shi, and O. Watkins. Using wireless sensor networks for fire rescue applications: Requirements and challenges. In Electro\/information Technology, 2006 IEEE International Conference on, pages 239--244, 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/s120709055"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.441"},{"key":"e_1_3_2_1_20_1","first-page":"7","volume-title":"the ACM Workshop on Real-World Wireless Sensor Networks (REALWSN '06)","author":"Wittenburg G.","year":"2006","unstructured":"Wittenburg , G. and J. Schiller . Running real-world software on simulated wireless sensor nodes . In the ACM Workshop on Real-World Wireless Sensor Networks (REALWSN '06) , pages 7 -- 11 , June 2006 . Wittenburg, G. and J. Schiller. Running real-world software on simulated wireless sensor nodes. In the ACM Workshop on Real-World Wireless Sensor Networks (REALWSN '06), pages 7--11, June 2006."},{"key":"e_1_3_2_1_21_1","volume-title":"the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006)","author":"Yu B.","year":"2006","unstructured":"Yu , B. and B. Xiao . Detecting selective forwarding attacks in wireless sensor networks . In the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006) , April 2006 . Yu, B. and B. Xiao. Detecting selective forwarding attacks in wireless sensor networks. In the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), April 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359546"}],"event":{"name":"PETRA '13: The 6th International Conference on PErvasive Technologies Related to Assistive Environments","sponsor":["NSF National Science Foundation","FORTH Foundation for Research and Technology - Hellas","HERACLEIA HERACLEIA Human-Centered Computing Laboratory at UTA","U of Tex at Arlington U of Tex at Arlington","TEI Technological Educational Institution of Athens","UCG University of Central Greece","NCRS Demokritos National Center for Scientific Research","Fulbrigh, Greece Fulbright Foundation, Greece","Ionian Ionian University, GREECE"],"location":"Rhodes Greece","acronym":"PETRA '13"},"container-title":["Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2504335.2504350","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2504335.2504350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:28Z","timestamp":1750231708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2504335.2504350"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,29]]},"references-count":21,"alternative-id":["10.1145\/2504335.2504350","10.1145\/2504335"],"URL":"https:\/\/doi.org\/10.1145\/2504335.2504350","relation":{},"subject":[],"published":{"date-parts":[[2013,5,29]]},"assertion":[{"value":"2013-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}