{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:14Z","timestamp":1750306274494,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T00:00:00Z","timestamp":1459814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,5]]},"DOI":"10.1145\/2897795.2897801","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["HackAttack"],"prefix":"10.1145","author":[{"given":"Erik M.","family":"Ferragut","sequence":"first","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, Tennessee"}]},{"given":"Andrew C.","family":"Brady","sequence":"additional","affiliation":[{"name":"Jefferson Middle School, Oak Ridge, Tennessee"}]},{"given":"Ethan J.","family":"Brady","sequence":"additional","affiliation":[{"name":"Oak Ridge High School, Oak Ridge, Tennessee"}]},{"given":"Jacob M.","family":"Ferragut","sequence":"additional","affiliation":[{"name":"Oak Ridge High School, Oak Ridge, Tennessee"}]},{"given":"Nathan M.","family":"Ferragut","sequence":"additional","affiliation":[{"name":"Oak Ridge High School, Oak Ridge, Tennessee"}]},{"given":"Max C.","family":"Wildgruber","sequence":"additional","affiliation":[{"name":"Oak Ridge High School, Oak Ridge, Tennessee"}]}],"member":"320","published-online":{"date-parts":[[2016,4,5]]},"reference":[{"volume-title":"12th Int. Symp. on Dynamic Games and Applications","year":"2006","author":"Alpcan T.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2019154"},{"volume-title":"Springer Science & Business Media","year":"2012","author":"Filar J.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1689499.1689584"},{"volume-title":"Proceedings of the Industrial and Systems Engineering Research Conference","year":"2012","author":"He F.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/945365.964288"},{"volume-title":"Ishi Press International","year":"2009","author":"Levy D. N. L.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00056"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190195.1190198"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2010.11005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0060-x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1817271.1817405"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1689499.1689587"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437828"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1748111.1748149"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5978424"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.1.5.31-42"},{"issue":"12","key":"e_1_3_2_1_18_1","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier B.","year":"1999","journal-title":"Dr. Dobb's journal"},{"issue":"3","key":"e_1_3_2_1_19_1","first-page":"312","article-title":"Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria. Automatic Control","volume":"50","author":"Shamma J. S.","year":"2005","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/14786445008521796"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830526"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.949"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949385"}],"event":{"name":"CISRC '16: 11th Annual Cyber and Information Security Research","sponsor":["Oak Ridge National Laboratory"],"location":"Oak Ridge TN USA","acronym":"CISRC '16"},"container-title":["Proceedings of the 11th Annual Cyber and Information Security Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897801","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897795.2897801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:45Z","timestamp":1750221525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897801"}},"subtitle":["Game-Theoretic Analysis of Realistic Cyber Conflicts"],"short-title":[],"issued":{"date-parts":[[2016,4,5]]},"references-count":23,"alternative-id":["10.1145\/2897795.2897801","10.1145\/2897795"],"URL":"https:\/\/doi.org\/10.1145\/2897795.2897801","relation":{},"subject":[],"published":{"date-parts":[[2016,4,5]]},"assertion":[{"value":"2016-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}