{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:40Z","timestamp":1750306120495,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,18]]},"DOI":"10.1145\/3054977.3055001","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T12:27:04Z","timestamp":1492432024000},"page":"185-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Game of Things"],"prefix":"10.1145","author":[{"given":"Antonino","family":"Rullo","sequence":"first","affiliation":[{"name":"DIMES Department, University of Calabria, via Pietro Bucci, Rende, Italy"}]},{"given":"Daniele","family":"Midi","sequence":"additional","affiliation":[{"name":"Computer Science, Cyber Center, and CERIAS, Purdue University, West Lafayette, IN, USA"}]},{"given":"Edoardo","family":"Serra","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Boise State University, Boise, ID, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Computer Science, Cyber Center, and CERIAS, Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Eitan Altman Konstantin Avrachenkov and Andrey Gamaev. 2009. Jamming in Wireless Networks: The Case of Several Jammers. In ICST.  Eitan Altman Konstantin Avrachenkov and Andrey Gamaev. 2009. Jamming in Wireless Networks: The Case of Several Jammers. In ICST.","DOI":"10.1109\/GAMENETS.2009.5137448"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Ho Ting Cheng and Weihua Zhuang. 2009. Pareto optimal resource management for wireless mesh networks with QoS assurance: joint node clustering and subcarrier allocation. IEEE Trans. on Wireless Communications (2009).  Ho Ting Cheng and Weihua Zhuang. 2009. Pareto optimal resource management for wireless mesh networks with QoS assurance: joint node clustering and subcarrier allocation. IEEE Trans. on Wireless Communications (2009).","DOI":"10.1109\/TWC.2008.080726"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"volume-title":"International Journal of Information Security","year":"2012","author":"Dewri Rinku","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462098"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/GAMENETS.2009.5137412"},{"key":"e_1_3_2_1_8_1","unstructured":"Devesh Jinwala Dhiren Patel and Kankar Dasgupta. 2012. FlexiSec: a configurable link layer security architecture for wireless sensor networks. (2012).  Devesh Jinwala Dhiren Patel and Kankar Dasgupta. 2012. FlexiSec: a configurable link layer security architecture for wireless sensor networks. (2012)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Anne-Marie Kermarrec Erwan Le Merrer Bruno Sericola and Gilles Tr\u00e9dan. 2011. Second order centrality: Distributed assessment of nodes criticity in complex networks. Computer Communications (2011).  Anne-Marie Kermarrec Erwan Le Merrer Bruno Sericola and Gilles Tr\u00e9dan. 2011. Second order centrality: Distributed assessment of nodes criticity in complex networks. Computer Communications (2011).","DOI":"10.1016\/j.comcom.2010.06.007"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"e_1_3_2_1_11_1","unstructured":"P. Levis S. Madden J. Polastre R. Szewczyk K. Whitehouse A. Woo D. Gay J. Hill M. Welsh E. Brewer and D. Culler. 2005. TinyOS: An Operating System for Sensor Networks. In Ambient Intelligence. Springer Berlin Heidelberg.  P. Levis S. Madden J. Polastre R. Szewczyk K. Whitehouse A. Woo D. Gay J. Hill M. Welsh E. Brewer and D. Culler. 2005. TinyOS: An Operating System for Sensor Networks. In Ambient Intelligence. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(02)00016-3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Sergio Marti Thomas J Giuli Kevin Lai and Mary Baker. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In ACM MobiCom.  Sergio Marti Thomas J Giuli Kevin Lai and Mary Baker. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In ACM MobiCom.","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Nayot Poolsappasit Rinku Dewri and Indrajit Ray. 2012. Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE Trans. Dependable Secur. Comput. (2012).  Nayot Poolsappasit Rinku Dewri and Indrajit Ray. 2012. Dynamic Security Risk Management Using Bayesian Attack Graphs. IEEE Trans. Dependable Secur. Comput. (2012).","DOI":"10.1109\/TDSC.2011.34"},{"volume-title":"SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks","year":"2013","author":"Raza Shahid","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.48"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Edoardo Serra Sushil Jajodia Andrea Pugliese Antonino Rullo and VS Subrahmanian. 2015. Pareto-optimal adversarial defense of enterprise systems. ACM Transactions on Information and System Security (TISSEC) (2015).  Edoardo Serra Sushil Jajodia Andrea Pugliese Antonino Rullo and VS Subrahmanian. 2015. Pareto-optimal adversarial defense of enterprise systems. ACM Transactions on Information and System Security (TISSEC) (2015).","DOI":"10.1145\/2699907"},{"key":"e_1_3_2_1_18_1","unstructured":"Kalpana Sharma and MK Ghose. 2010. Wireless sensor networks: An overview on its security threats. IJCA Special Issue on fiMobile Ad-hoc Networksfi MANETs (2010) 42--45.  Kalpana Sharma and MK Ghose. 2010. Wireless sensor networks: An overview on its security threats. IJCA Special Issue on fiMobile Ad-hoc Networksfi MANETs (2010) 42--45."},{"volume-title":"Proc. of the European Simulation Multiconference (ESM'2001)","year":"2001","author":"Varga Andr\u00e1s","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Heinrich von Stackelberg Damien Bazin Rowland Hill and Lynn Urch. 2010. Market Structure and Equilibrium. Springer.  Heinrich von Stackelberg Damien Bazin Rowland Hill and Lynn Urch. 2010. Market Structure and Equilibrium. Springer."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426481"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502451"}],"event":{"name":"IoTDI '17: International Conference on Internet-of-Things Design and Implementation","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","IEEE CS"],"location":"Pittsburgh PA USA","acronym":"IoTDI '17"},"container-title":["Proceedings of the Second International Conference on Internet-of-Things Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3054977.3055001","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3054977.3055001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:44Z","timestamp":1750217804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3054977.3055001"}},"subtitle":["Strategic Allocation of Security Resources for IoT"],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":22,"alternative-id":["10.1145\/3054977.3055001","10.1145\/3054977"],"URL":"https:\/\/doi.org\/10.1145\/3054977.3055001","relation":{},"subject":[],"published":{"date-parts":[[2017,4,18]]},"assertion":[{"value":"2017-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}