{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:42:50Z","timestamp":1767919370090,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T00:00:00Z","timestamp":1570579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,9]]},"DOI":"10.1145\/3359986.3361208","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T12:21:06Z","timestamp":1570450866000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Modeling observability in adaptive systems to defend against advanced persistent threats"],"prefix":"10.1145","author":[{"given":"Cody","family":"Kinneer","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Ryan","family":"Wagner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Fei","family":"Fang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Claire","family":"Le Goues","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"David","family":"Garlan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2019,10,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Advanced Persistent Threat Groups. https:\/\/www.fireeye.com\/current-threats\/apt-groups.html. Accessed: 2018-04."},{"key":"e_1_3_2_1_2_1","first-page":"2018","article-title":"\/10\/inside-cyberattack-shocked-us-government\/","author":"Inside","year":"2016","unstructured":"[n.d.]. Inside the cyberattack that shocked the US government. https:\/\/www.wired.com\/2016\/10\/inside-cyberattack-shocked-us-government\/. Accessed: 2018-04.","journal-title":"Accessed"},{"key":"e_1_3_2_1_3_1","volume-title":"Target: 40 million credit cards compromised","unstructured":"[n.d.]. Target: 40 million credit cards compromised. http:\/\/money.cnn.com\/2013\/12\/18\/news\/companies\/target-credit-card\/index.html. Accessed: 2018-02-15."},{"key":"e_1_3_2_1_4_1","volume-title":"Superhuman AI for heads-up no-limit poker: Libratus beats top professionals. Science 359, 6374","author":"Brown Noam","year":"2018","unstructured":"Noam Brown and Tuomas Sandholm. 2018. Superhuman AI for heads-up no-limit poker: Libratus beats top professionals. Science 359, 6374 (2018), 418--424."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134717"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336559"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2007.2"},{"key":"e_1_3_2_1_9_1","volume-title":"Autonomic and Secure Computing (DASC), 2014 IEEE 12th International Conference on. IEEE.","author":"Fang Xupeng","year":"2014","unstructured":"Xupeng Fang, Lidong Zhai, Zhaopeng Jia, and Wenyan Bai. 2014. A game model for predicting the attack path of APT. In Dependable, Autonomic and Secure Computing (DASC), 2014 IEEE 12th International Conference on. IEEE."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_12"},{"key":"e_1_3_2_1_11_1","unstructured":"LLC Gurobi Optimization. 2018. Gurobi Optimizer Reference Manual. http:\/\/www.gurobi.com"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.18.5.80"},{"key":"e_1_3_2_1_13_1","volume-title":"ctree: Conditional inference trees. The Comprehensive R Archive Network","author":"Hothorn Torsten","year":"2015","unstructured":"Torsten Hothorn, Kurt Hornik, and Achim Zeileis. 2015. ctree: Conditional inference trees. The Comprehensive R Archive Network (2015), 1--34."},{"key":"e_1_3_2_1_14_1","volume-title":"Chess","author":"Kephart Jeffrey O.","year":"2003","unstructured":"Jeffrey O. Kephart and David M. Chess. 2003. The Vision of Autonomic Computing. Computer 36, 1 (2003)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947915.1947939"},{"key":"e_1_3_2_1_16_1","volume-title":"Glossary of key information security terms","author":"Kissel Richard","unstructured":"Richard Kissel. 2011. Glossary of key information security terms. Diane Publishing."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Christian Kroer Gabriele Farina and Tuomas Sandholm. 2017. Robust Stackelberg Equilibria in Extensive-Form Games and Extension to Limited Lookahead. arXiv:cs.GT\/1711.08080","DOI":"10.1609\/aaai.v32i1.11482"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2343776.2343814"},{"key":"e_1_3_2_1_19_1","volume-title":"Version 16.0.1","author":"McKelvey Richard D.","unstructured":"Richard D. McKelvey, Andrew M. McLennan, and Theodore L. Turocy. [n.d.]. Gambit: Software Tools for Game Theory, Version 16.0.1. http:\/\/www.gambitproject.org. Accessed: 2018-02."},{"key":"e_1_3_2_1_20_1","volume-title":"Algorithmic game theory","author":"Nisan Noam","unstructured":"Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V Vazirani. 2007. Algorithmic game theory. Vol. 1. Cambridge University Press Cambridge."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems -","volume":"2","author":"Paruchuri Praveen","year":"2008","unstructured":"Praveen Paruchuri, Jonathan P. Pearce, Janusz Marecki, Milind Tambe, Fernando Ordonez, and Sarit Kraus. 2008. Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games. In Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2 (AAMAS '08). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC."},{"key":"e_1_3_2_1_22_1","volume-title":"Thi Thu Hang Nguyen, and Quanyan Zhu","author":"Pawlick Jeffrey","year":"2017","unstructured":"Jeffrey Pawlick, Thi Thu Hang Nguyen, and Quanyan Zhu. 2017. Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats. CoRR abs\/1707.08031 (2017). arXiv:1707.08031"},{"key":"e_1_3_2_1_23_1","volume-title":"Defending against advanced persistent threats using game-theory. PloS one 12, 1","author":"Rass Stefan","year":"2017","unstructured":"Stefan Rass, Sandra K\u00f6nig, and Stefan Schauer. 2017. Defending against advanced persistent threats using game-theory. PloS one 12, 1 (2017)."},{"key":"e_1_3_2_1_24_1","volume-title":"GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats. In Decision and Game Theory for Security","author":"Rass Stefan","year":"2016","unstructured":"Stefan Rass and Quanyan Zhu. 2016. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats. In Decision and Game Theory for Security, Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, and William Casey (Eds.). Springer International Publishing, Cham."},{"key":"e_1_3_2_1_26_1","volume-title":"Attack trees. Dr. Dobb's journal 24, 12","author":"Schneier Bruce","year":"1999","unstructured":"Bruce Schneier. 1999. Attack trees. Dr. Dobb's journal 24, 12 (1999)."},{"key":"e_1_3_2_1_27_1","unstructured":"David Silver Thomas Hubert Julian Schrittwieser Ioannis Antonoglou Matthew Lai Arthur Guez Marc Lanctot Laurent Sifre Dharshan Kumaran Thore Graepel et al. 2017. Mastering chess and shogi by self-play with a general reinforcement learning algorithm. arXiv preprint arXiv:1712.01815 (2017)."},{"key":"e_1_3_2_1_28_1","volume-title":"R: A language and environment for statistical computing.","author":"R Core Team","year":"2013","unstructured":"R Core Team et al. 2013. R: A language and environment for statistical computing. (2013)."},{"key":"e_1_3_2_1_29_1","article-title":"FlipIt: The game of \"stealthy takeover","volume":"26","author":"Dijk Marten Van","year":"2013","unstructured":"Marten Van Dijk, Ari Juels, Alina Oprea, and Ronald L Rivest. 2013. FlipIt: The game of \"stealthy takeover\". Journal of Cryptology 26, 4 (2013).","journal-title":"Journal of Cryptology"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219166.3219219"},{"key":"e_1_3_2_1_31_1","first-page":"3","article-title":"Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study","volume":"35","author":"Xiao Liang","year":"2017","unstructured":"Liang Xiao, Dongjin Xu, Caixia Xie, Narayan B. Mandayam, and H. Vincent Poor. 2017. Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study. IEEE J. Sel. A. Commun. 35, 3 (March 2017).","journal-title":"IEEE J. Sel. A. Commun."}],"event":{"name":"MEMOCODE '19: 17th ACM-IEEE International Conference on Formal Methods and Models for System Design","location":"La Jolla California","acronym":"MEMOCODE '19","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA"]},"container-title":["Proceedings of the 17th ACM-IEEE International Conference on Formal Methods and Models for System Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359986.3361208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359986.3361208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:27Z","timestamp":1750202007000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359986.3361208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,9]]},"references-count":30,"alternative-id":["10.1145\/3359986.3361208","10.1145\/3359986"],"URL":"https:\/\/doi.org\/10.1145\/3359986.3361208","relation":{},"subject":[],"published":{"date-parts":[[2019,10,9]]},"assertion":[{"value":"2019-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}