{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:09Z","timestamp":1750220349023,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T00:00:00Z","timestamp":1618876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-19-1-0362"],"award-info":[{"award-number":["W911NF-19-1-0362"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Digital Threats"],"published-print":{"date-parts":[[2021,6,30]]},"abstract":"<jats:p>\n            Potential for huge loss from malicious exploitation of software calls for development of principles of cyber-insurance. Estimating what to insure and for how much and what might be the premiums poses challenges because of the uncertainties, such as the timings of emergence and lethality of malicious apps, human propensity to favor ease by giving more privilege to downloaded apps over inconvenience of delay or functionality, the chance of infection determined by the lifestyle of the mobile device user, and the monetary value of the compromise of software, and so on. We provide a theoretical framework for cyber-insurance backed by game-theoretic formulation to calculate monetary value of risk and the insurance premiums associated with software compromise. By establishing the conditions for Nash equilibrium between strategies of an adversary and software we derive probabilities for risk, potential loss, gain to adversary from app categories, such as lifestyles, entertainment, education, and so on, and their prevalence ratios. Using simulations over a range of possibilities, and using publicly available malware statistics, we provide insights about the strategies that can be taken by the software and the adversary. We show the application of our framework on the most recent mobile malware data (2018 ISTR report\u2014data for the year 2017) that consists of the top five Android malware apps:\n            <jats:italic>Malapp, Fakeinst, Premiumtext, Maldownloader<\/jats:italic>\n            , and\n            <jats:italic>Simplelocker<\/jats:italic>\n            and the resulting leaked phone number, location information, and installed app information. Uniqueness of our work stems from developing mathematical framework and providing insights of estimating cyber-insurance parameters through game-theoretic choice of strategies and by showing its efficacy on\n            <jats:italic>a recent real malicious app data<\/jats:italic>\n            . These insights will be of tremendous help to researchers and practitioners in the security community.\n          <\/jats:p>","DOI":"10.1145\/3409959","type":"journal-article","created":{"date-parts":[[2021,4,20]],"date-time":"2021-04-20T10:07:19Z","timestamp":1618913239000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6224-6469","authenticated-orcid":false,"given":"Li","family":"Wang","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2944-8178","authenticated-orcid":false,"given":"S. Sitharama","family":"Iyengar","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1008-3025","authenticated-orcid":false,"given":"Amith K.","family":"Belman","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Pawe\u0142","family":"\u015aniata\u0142a","sequence":"additional","affiliation":[{"name":"Pozna\u0144 University of Technology, Pozna\u0144, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5390-8253","authenticated-orcid":false,"given":"Vir V.","family":"Phoha","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Changsheng","family":"Wan","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2021,4,20]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"49","article-title":"Investing in cybersecurity: Insights from the gordon-loeb model","volume":"7","author":"Gordon Lawrence A.","year":"2016","unstructured":"Lawrence A. Gordon , Martin Loeb , and Lei Zhou . 2016 . Investing in cybersecurity: Insights from the gordon-loeb model . J. Inf. Secur. 7 , 1 (2016), 49 -- 59 . DOI:https:\/\/doi.org\/10.4236\/jis.2016.72004 10.4236\/jis.2016.72004 Lawrence A. Gordon, Martin Loeb, and Lei Zhou. 2016. Investing in cybersecurity: Insights from the gordon-loeb model. J. Inf. Secur. 7, 1 (2016), 49--59. DOI:https:\/\/doi.org\/10.4236\/jis.2016.72004","journal-title":"J. Inf. Secur."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511760778"},{"key":"e_1_2_1_3_1","first-page":"3","article-title":"Cyberinsurance in IT security management","volume":"5","author":"Baer W. S.","year":"2007","unstructured":"W. S. Baer and A. Parkinson . 2007 . Cyberinsurance in IT security management . IEEE Secur. Priv. 5 , 3 (May 2007), 50--56. DOI:https:\/\/doi.org\/10.1109\/MSP.2007.57 10.1109\/MSP.2007.57 W. S. Baer and A. Parkinson. 2007. Cyberinsurance in IT security management. IEEE Secur. Priv. 5, 3 (May 2007), 50--56. DOI:https:\/\/doi.org\/10.1109\/MSP.2007.57","journal-title":"IEEE Secur. Priv."},{"key":"e_1_2_1_4_1","unstructured":"Yuliy Baryshnikov. [n.d.]. IT Security Investment and Gordon-Loeb\u2019s 1\/e Rule.  Yuliy Baryshnikov. [n.d.]. IT Security Investment and Gordon-Loeb\u2019s 1\/e Rule."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0515036100006619"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","first-page":"89","DOI":"10.2143\/AST.15.2.2015021","article-title":"Premium calculation from top down","volume":"15","author":"B\u00fchlmann Hans","year":"1985","unstructured":"Hans B\u00fchlmann . 1985 . Premium calculation from top down . ASTIN Bull. 15 , 2 (1985), 89 -- 101 . Hans B\u00fchlmann. 1985. Premium calculation from top down. ASTIN Bull. 15, 2 (1985), 89--101.","journal-title":"ASTIN Bull."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"volume-title":"Proceedings of the International Conference on Availability, Reliability and Security. 266--271","author":"Espinoza Antonio M.","key":"e_1_2_1_8_1","unstructured":"Antonio M. Espinoza , Jeffrey Knockel , Pedro Comesanaalfaro , and Jedidiah R. Crandall . 2016. V-DIFT: Vector-based dynamic information flow tracking with application to locating cryptographic keys for reverse engineering . In Proceedings of the International Conference on Availability, Reliability and Security. 266--271 . Antonio M. Espinoza, Jeffrey Knockel, Pedro Comesanaalfaro, and Jedidiah R. Crandall. 2016. V-DIFT: Vector-based dynamic information flow tracking with application to locating cryptographic keys for reverse engineering. In Proceedings of the International Conference on Availability, Reliability and Security. 266--271."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2013.05.004"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201913)","author":"Gu Boxuan","year":"2013","unstructured":"Boxuan Gu , Xinfeng Li , Gang Li , A. C. Champion , Zhezhe Chen , Feng Qin , and Dong Xuan . 2013 . D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources . In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201913) . 791--799. Boxuan Gu, Xinfeng Li, Gang Li, A. C. Champion, Zhezhe Chen, Feng Qin, and Dong Xuan. 2013. D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201913). 791--799."},{"key":"e_1_2_1_11_1","volume-title":"8th","author":"Horne William G.","year":"2010","unstructured":"William G. Horne , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , Olin W. Sibert , Lesley R. Matheson , Andrew K. Wright , and Susan S. Owicki . 2017. Systems and methods for watermarking software and other media. Patent No. US7770016B2, Filed April, 19th 2007, Issued March , 8th , 2010 . William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, Olin W. Sibert, Lesley R. Matheson, Andrew K. Wright, and Susan S. Owicki. 2017. Systems and methods for watermarking software and other media. Patent No. US7770016B2, Filed April, 19th 2007, Issued March, 8th, 2010."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812205"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3232848","article-title":"A survey on game-theoretic approaches for intrusion detection and response optimization","volume":"51","author":"Kiennert Christophe","year":"2018","unstructured":"Christophe Kiennert , Ziad Ismail , Herv\u00e9 Debar , and Jean Leneutre . 2018 . A survey on game-theoretic approaches for intrusion detection and response optimization . Comput. Surv. 51 , 8 (2018), 1 -- 31 . DOI:https:\/\/doi.org\/10.1145\/3232848 10.1145\/3232848 Christophe Kiennert, Ziad Ismail, Herv\u00e9 Debar, and Jean Leneutre. 2018. A survey on game-theoretic approaches for intrusion detection and response optimization. Comput. Surv. 51, 8 (2018), 1--31. DOI:https:\/\/doi.org\/10.1145\/3232848","journal-title":"Comput. Surv."},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MITP.2018.2874210","article-title":"The economics of cyber-insurance","volume":"20","author":"Kshetri N.","year":"2018","unstructured":"N. Kshetri . 2018 . The economics of cyber-insurance . IT Prof. 20 , 6 (Nov. 2018), 9--14. DOI:https:\/\/doi.org\/10.1109\/MITP.2018.2874210 10.1109\/MITP.2018.2874210 N. Kshetri. 2018. The economics of cyber-insurance. IT Prof. 20, 6 (Nov. 2018), 9--14. DOI:https:\/\/doi.org\/10.1109\/MITP.2018.2874210","journal-title":"IT Prof."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the Design Automation Conference. 79","author":"Lee Jinyong","year":"2015","unstructured":"Jinyong Lee , Ingoo Heo , Yongje Lee , and Yunheung Paek . 2015 . Efficient dynamic information flow tracking on a processor with core debug interface . In Proceedings of the Design Automation Conference. 79 . Jinyong Lee, Ingoo Heo, Yongje Lee, and Yunheung Paek. 2015. Efficient dynamic information flow tracking on a processor with core debug interface. In Proceedings of the Design Automation Conference. 79."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121213"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E\u201918)","author":"Lepoint T.","year":"2018","unstructured":"T. Lepoint , G. Ciocarlie , and K. Eldefrawy . 2018. BlockCIS\u2014A blockchain-based cyber insurance system . In Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E\u201918) . 378--384. DOI:https:\/\/doi.org\/10.1109\/IC2E. 2018 .00072 10.1109\/IC2E.2018.00072 T. Lepoint, G. Ciocarlie, and K. Eldefrawy. 2018. BlockCIS\u2014A blockchain-based cyber insurance system. In Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E\u201918). 378--384. DOI:https:\/\/doi.org\/10.1109\/IC2E.2018.00072"},{"key":"e_1_2_1_18_1","volume-title":"SENIX Annual Technical Conference (USENIX ATC\u201914)","author":"Li Yanlin","year":"2014","unstructured":"Yanlin Li , Jonathan McCune , James Newsome , Adrian Perrig , Brandon Baker , and Will Drewry . 2014 . MiniBox: A Two-Way Sandbox for x86 Native Code . In SENIX Annual Technical Conference (USENIX ATC\u201914) . USENIX Association, 409--420. Yanlin Li, Jonathan McCune, James Newsome, Adrian Perrig, Brandon Baker, and Will Drewry. 2014. MiniBox: A Two-Way Sandbox for x86 Native Code. In SENIX Annual Technical Conference (USENIX ATC\u201914). USENIX Association, 409--420."},{"key":"e_1_2_1_19_1","first-page":"6","article-title":"Cyber insurance for heterogeneous wireless networks","volume":"56","author":"Lu X.","year":"2018","unstructured":"X. Lu , D. Niyato , H. Jiang , P. Wang , and H. V. Poor . 2018 . Cyber insurance for heterogeneous wireless networks . IEEE Commun. Mag. 56 , 6 (June 2018), 21--27. DOI:https:\/\/doi.org\/10.1109\/MCOM.2018.1700504 10.1109\/MCOM.2018.1700504 X. Lu, D. Niyato, H. Jiang, P. Wang, and H. V. Poor. 2018. Cyber insurance for heterogeneous wireless networks. IEEE Commun. Mag. 56, 6 (June 2018), 21--27. DOI:https:\/\/doi.org\/10.1109\/MCOM.2018.1700504","journal-title":"IEEE Commun. Mag."},{"key":"e_1_2_1_20_1","article-title":"Applying game theory to the incremental funding method in software projects","volume":"9","author":"Da Cunha Mattos Eduardo Maciel","year":"2014","unstructured":"Eduardo Maciel Da Cunha Mattos , Marcelo Vieira , Eber Assis Schmitz , and Antonio Juarez Alencar . 2014 . Applying game theory to the incremental funding method in software projects . J. Softw. 9 , 6 (2014). Eduardo Maciel Da Cunha Mattos, Marcelo Vieira, Eber Assis Schmitz, and Antonio Juarez Alencar. 2014. Applying game theory to the incremental funding method in software projects. J. Softw. 9, 6 (2014).","journal-title":"J. Softw."},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA\u201918)","author":"Meland P. H.","year":"2018","unstructured":"P. H. Meland and F. Seehusen . 2018. When to treat security risks with cyber insurance . In Proceedings of the 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA\u201918) . 1--8. DOI:https:\/\/doi.org\/10.1109\/CyberSA. 2018 .8551456 10.1109\/CyberSA.2018.8551456 P. H. Meland and F. Seehusen. 2018. When to treat security risks with cyber insurance. In Proceedings of the 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA\u201918). 1--8. DOI:https:\/\/doi.org\/10.1109\/CyberSA.2018.8551456"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.137"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.36.1.48"},{"key":"e_1_2_1_24_1","first-page":"313","article-title":"The role of game theory in the analysis of software radio networks","volume":"118","author":"Neel James","year":"2002","unstructured":"James Neel , Virginia Mprg , Tech, Jeffrey H. Reed , Mprg, Virginia Tech , and Robert P. Gilles . 2002 . The role of game theory in the analysis of software radio networks . Rev. Med. Chile 118 , 3 (2002), 313 -- 319 . James Neel, Virginia Mprg, Tech, Jeffrey H. Reed, Mprg, Virginia Tech, and Robert P. Gilles. 2002. The role of game theory in the analysis of software radio networks. Rev. Med. Chile 118, 3 (2002), 313--319.","journal-title":"Rev. Med. Chile"},{"key":"e_1_2_1_25_1","unstructured":"International Association of Insurance Supervisors (IAIS). 2018. Insurance Core Principles.  International Association of Insurance Supervisors (IAIS). 2018. Insurance Core Principles."},{"volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS\u201915)","author":"Oren Yossef","key":"e_1_2_1_26_1","unstructured":"Yossef Oren , Vasileios P. Kemerlis , Simha Sethumadhavan , and Angelos D. Keromytis . 2015. The spy in the sandbox: Practical cache attacks in JavaScript and their implications . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS\u201915) . Association for Computing Machinery, 1406--1418. DOI:10.1145\/2810103.2813708 10.1145\/2810103.2813708 Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, and Angelos D. Keromytis. 2015. The spy in the sandbox: Practical cache attacks in JavaScript and their implications. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS\u201915). Association for Computing Machinery, 1406--1418. DOI:10.1145\/2810103.2813708"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 2006 International Workshop on Economics Driven Software Engineering Research. 49--54","author":"Oza Nilay V.","year":"2006","unstructured":"Nilay V. Oza . 2006 . Game theory perspectives on client:Vendor relationships in offshore software outsourcing . In Proceedings of the 2006 International Workshop on Economics Driven Software Engineering Research. 49--54 . Nilay V. Oza. 2006. Game theory perspectives on client:Vendor relationships in offshore software outsourcing. In Proceedings of the 2006 International Workshop on Economics Driven Software Engineering Research. 49--54."},{"volume-title":"Proceedings of the 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM\u201913)","author":"Pal R.","key":"e_1_2_1_28_1","unstructured":"R. Pal and P. Hui . 2013. On differentiating cyber-insurance contracts a topological perspective . In Proceedings of the 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM\u201913) . 836--839. R. Pal and P. Hui. 2013. On differentiating cyber-insurance contracts a topological perspective. In Proceedings of the 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM\u201913). 836--839."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10287-014-0206-x"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08225-5"},{"key":"e_1_2_1_31_1","volume-title":"2010 International Conference on Intelligent Computation Technology and Automation","volume":"2","author":"Xuehua J.","year":"2010","unstructured":"J. Xuehua . 2010 . Digital watermarking and its application in image copyright protection . In 2010 International Conference on Intelligent Computation Technology and Automation , Vol. 2 . 114--117. DOI:10.1109\/ICICTA.2010.625 10.1109\/ICICTA.2010.625 J. Xuehua. 2010. Digital watermarking and its application in image copyright protection. In 2010 International Conference on Intelligent Computation Technology and Automation, Vol. 2. 114--117. DOI:10.1109\/ICICTA.2010.625"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the ACM Symposium on Applied Computing. 1808--1815","author":"Spreitzenbarth Michael","year":"2013","unstructured":"Michael Spreitzenbarth , Felix Freiling , Florian Echtler , Thomas Schreck , and Johannes Hoffmann . 2013 . Mobile-sandbox:Having a deeper look into android applications . In Proceedings of the ACM Symposium on Applied Computing. 1808--1815 . Michael Spreitzenbarth, Felix Freiling, Florian Echtler, Thomas Schreck, and Johannes Hoffmann. 2013. Mobile-sandbox:Having a deeper look into android applications. In Proceedings of the ACM Symposium on Applied Computing. 1808--1815."},{"volume-title":"Retrieved","year":"2018","key":"e_1_2_1_33_1","unstructured":"Symantec. 2018 . 2018 Internet Security Threat Report . Retrieved October 12, 2018 from https:\/\/www.symantec.com\/security-center\/threat-report. Symantec. 2018. 2018 Internet Security Threat Report. Retrieved October 12, 2018 from https:\/\/www.symantec.com\/security-center\/threat-report."},{"key":"e_1_2_1_34_1","volume-title":"Curino","author":"Terwilliger James F.","year":"2012","unstructured":"James F. Terwilliger , Anthony Cleve , and Carlo A . Curino . 2012 . How Clean Is Your Sandbox? Springer , Berlin. 1--23 pages. James F. Terwilliger, Anthony Cleve, and Carlo A. Curino. 2012. How Clean Is Your Sandbox? Springer, Berlin. 1--23 pages."},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA\u201918)","author":"Uuganbayar G.","year":"2018","unstructured":"G. Uuganbayar , A. Yautsiukhin , and F. Martinelli . 2018. Cyber insurance and security interdependence: Friends or foes? In Proceedings of the 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA\u201918) . 1--4. DOI:https:\/\/doi.org\/10.1109\/CyberSA. 2018 .8551447 10.1109\/CyberSA.2018.8551447 G. Uuganbayar, A. Yautsiukhin, and F. Martinelli. 2018. Cyber insurance and security interdependence: Friends or foes? In Proceedings of the 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA\u201918). 1--4. DOI:https:\/\/doi.org\/10.1109\/CyberSA.2018.8551447"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881694"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, 447--458","author":"Vidas Timothy","year":"2014","unstructured":"Timothy Vidas and Nicolas Christin . 2014 . Evading android runtime analysis via sandbox detection . In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, 447--458 . Timothy Vidas and Nicolas Christin. 2014. Evading android runtime analysis via sandbox detection. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, 447--458."},{"key":"e_1_2_1_38_1","first-page":"71","article-title":"Premium calculation by transforming the layer premium density","volume":"26","author":"Wang Shaun","year":"1996","unstructured":"Shaun Wang . 1996 . Premium calculation by transforming the layer premium density . ASTIN Bulletin: The Journal of the IAA 26 , 1 (1996), 71 -- 92 . Shaun Wang. 1996. Premium calculation by transforming the layer premium density. ASTIN Bulletin: The Journal of the IAA 26, 1 (1996), 71--92.","journal-title":"The Journal of the IAA"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference","volume":"2","author":"Yanqun Zhang","year":"2011","unstructured":"Zhang Yanqun and Wang Qianping . 2011 . Digital watermarking algorithm of vector map based on feature points . In Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference , Vol. 2 . 1430--1433. DOI:10.1109\/CSQRWC.2011.6037234 10.1109\/CSQRWC.2011.6037234 Zhang Yanqun and Wang Qianping. 2011. Digital watermarking algorithm of vector map based on feature points. In Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2. 1430--1433. DOI:10.1109\/CSQRWC.2011.6037234"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2011.10.012"}],"container-title":["Digital Threats: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3409959","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3409959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:08Z","timestamp":1750191428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409959"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,20]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6,30]]}},"alternative-id":["10.1145\/3409959"],"URL":"https:\/\/doi.org\/10.1145\/3409959","relation":{},"ISSN":["2692-1626","2576-5337"],"issn-type":[{"type":"print","value":"2692-1626"},{"type":"electronic","value":"2576-5337"}],"subject":[],"published":{"date-parts":[[2021,4,20]]},"assertion":[{"value":"2019-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}