{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:26:07Z","timestamp":1766485567743,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T00:00:00Z","timestamp":1608249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Keystone Research and Development Program of China","award":["Grant 2017YFB0803204"],"award-info":[{"award-number":["Grant 2017YFB0803204"]}]},{"name":"The Shenzhen Research Programs","award":["Grant JCYJ20190808155607340; JSGG20170406144032901;JSGG20170824095858416;JCYJ20170306092030521"],"award-info":[{"award-number":["Grant JCYJ20190808155607340; JSGG20170406144032901;JSGG20170824095858416;JCYJ20170306092030521"]}]},{"name":"The Research and Development Key Program","award":["Grant 2019B010137001"],"award-info":[{"award-number":["Grant 2019B010137001"]}]},{"name":"The Natural Science Foundation of China (NSFC)","award":["Grant 61671001"],"award-info":[{"award-number":["Grant 61671001"]}]},{"name":"The Shenzhen Municipal Development and Reform Commission"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,18]]},"DOI":"10.1145\/3447654.3447660","type":"proceedings-article","created":{"date-parts":[[2021,5,13]],"date-time":"2021-05-13T21:36:12Z","timestamp":1620941772000},"page":"34-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimal Strategy Selecting Method for Mimic Defense Based on Incomplete Information Dynamic Game"],"prefix":"10.1145","author":[{"given":"ZEQUAN","family":"CHEN","sequence":"first","affiliation":[{"name":"School of Electronic and Computer Engineering and Peking University, China"}]},{"given":"JIFEN","family":"SUN","sequence":"additional","affiliation":[{"name":"Guangdong Communications&amp;Networks Institute, China"}]},{"given":"XIN","family":"YANG","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering and Peking University, China"}]},{"given":"GANG","family":"CUI","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Nuclear Power Safety Monitoring Technology and Equipment, China"}]},{"given":"HUI","family":"LI","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering and Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Zhuang Rui Su Zhang Scott A. DeLoach Xinming Ou and Anoop Singhal. \"Simulation-based approaches to studying effectiveness of moving-target network defense.\" In National symposium on moving target research vol. 246. 2012. Zhuang Rui Su Zhang Scott A. DeLoach Xinming Ou and Anoop Singhal. \"Simulation-based approaches to studying effectiveness of moving-target network defense.\" In National symposium on moving target research vol. 246. 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-319-12574-9_12","article-title":"An integrated framework for innovation management in cyber security and privacy","author":"Kapletia Dharm","year":"2014","unstructured":"Kapletia , Dharm , Massimo Felici , and Nick Wainwright . \" An integrated framework for innovation management in cyber security and privacy .\" In Cyber Security and Privacy Forum , pp. 135 - 147 . Springer, Cham, 2014 . https:\/\/doi.org\/10.1007\/978-3-319-12574-9_12 10.1007\/978-3-319-12574-9_12 Kapletia, Dharm, Massimo Felici, and Nick Wainwright. \"An integrated framework for innovation management in cyber security and privacy.\" In Cyber Security and Privacy Forum, pp. 135-147. Springer, Cham, 2014. https:\/\/doi.org\/10.1007\/978-3-319-12574-9_12","journal-title":"Cyber Security and Privacy Forum"},{"issue":"7","key":"e_1_3_2_1_3_1","first-page":"2","article-title":"Meaning and vision of mimic computing and mimic security defense","volume":"30","author":"Wu Jangxing","year":"2014","unstructured":"Wu , Jangxing . \" Meaning and vision of mimic computing and mimic security defense .\" Telecommunications Science 30 , no. 7 ( 2014 ): 2 - 7 . Wu, Jangxing. \"Meaning and vision of mimic computing and mimic security defense.\" Telecommunications Science 30, no. 7 (2014): 2-7.","journal-title":"Telecommunications Science"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2009.00817"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE, 2017","author":"Feng Xiaotao","year":"2017","unstructured":"Feng , Xiaotao , Zizhan Zheng , Derya Cansever , Ananthram Swami , and Prasant Mohapatra . \" A signaling game model for moving target defense.\" In IEEE INFOCOM 2017-IEEE conference on computer communications, pp. 1-9 . IEEE, 2017 . https:\/\/doi.org\/10.1109\/INFOCOM. 2017 .8057200 10.1109\/INFOCOM.2017.8057200 Feng, Xiaotao, Zizhan Zheng, Derya Cansever, Ananthram Swami, and Prasant Mohapatra. \"A signaling game model for moving target defense.\" In IEEE INFOCOM 2017-IEEE conference on computer communications, pp. 1-9. IEEE, 2017. https:\/\/doi.org\/10.1109\/INFOCOM.2017.8057200"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE, 2013","author":"Gao Xiang","year":"2013","unstructured":"Gao , Xiang , and Yue-Fei Zhu . \"DDo S defense mechanism analysis based on signaling game model.\" In 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, vol. 1, pp. 414-417 . IEEE, 2013 . https:\/\/doi.org\/10.1109\/IHMSC. 2013 .105 10.1109\/IHMSC.2013.105 Gao, Xiang, and Yue-Fei Zhu. \"DDoS defense mechanism analysis based on signaling game model.\" In 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, vol. 1, pp. 414-417. IEEE, 2013. https:\/\/doi.org\/10.1109\/IHMSC.2013.105"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.12.001"},{"key":"e_1_3_2_1_8_1","first-page":"1347","article-title":"Active defense strategy selection based on non-zero-sum attack-defense game model","volume":"33","author":"Chen Yu Fu","year":"2013","unstructured":"Chen , Yong-qiang, Yu Fu , and Xiao-ping Wu. \" Active defense strategy selection based on non-zero-sum attack-defense game model .\" J. Comput. Appl 33 ( 2013 ): 1347 - 1349 . https:\/\/doi.org\/ 10.3724\/SP.J.1087.2013.01347 10.3724\/SP.J.1087.2013.01347 Chen, Yong-qiang, Yu Fu, and Xiao-ping Wu. \"Active defense strategy selection based on non-zero-sum attack-defense game model.\" J. Comput. Appl 33 (2013): 1347-1349. https:\/\/doi.org\/ 10.3724\/SP.J.1087.2013.01347","journal-title":"J. Comput. Appl"},{"issue":"5","key":"e_1_3_2_1_9_1","first-page":"64","article-title":"The Modeling and Risk Assessment on Redundancy Adjudication of Mimic Defense","volume":"3","author":"Li W., Z.","year":"2018","unstructured":"Li , W., Z. Zhang , L. Wang , and J. Wu. \" The Modeling and Risk Assessment on Redundancy Adjudication of Mimic Defense .\" Journal of Cyber Security 3 , no. 5 ( 2018 ): 64 - 74 . https:\/\/doi.org\/10.19363\/J.cnki.cn10-1380\/tn.2018.09.06 10.19363\/J.cnki.cn10-1380 Li, W., Z. Zhang, L. Wang, and J. Wu. \"The Modeling and Risk Assessment on Redundancy Adjudication of Mimic Defense.\" Journal of Cyber Security 3, no. 5 (2018): 64-74. https:\/\/doi.org\/10.19363\/J.cnki.cn10-1380\/tn.2018.09.06","journal-title":"Journal of Cyber Security"},{"issue":"10","key":"e_1_3_2_1_10_1","first-page":"143","article-title":"Markov game modeling of mimic defense and defense strategy determination","volume":"39","author":"Zhang X., Z.","year":"2018","unstructured":"Zhang , X., Z. Gu , S. Wei , and J. Shen . \" Markov game modeling of mimic defense and defense strategy determination .\" Journal on Communications 39 , no. 10 ( 2018 ): 143 - 154 . https:\/\/doi.org\/ 10.11959\/j.issn.1000-436x.2018223 10.11959\/j.issn.1000-436x.2018223 Zhang, X., Z. Gu, S. Wei, and J. Shen. \"Markov game modeling of mimic defense and defense strategy determination.\" Journal on Communications 39, no. 10 (2018): 143-154. https:\/\/doi.org\/ 10.11959\/j.issn.1000-436x.2018223","journal-title":"Journal on Communications"},{"volume-title":"Research on Dynamic Scheduling Strategy for Mimic Defense. Master's thesis","author":"Zhang Z.X.","key":"e_1_3_2_1_11_1","unstructured":"Zhang , Z.X. , 2018. Research on Dynamic Scheduling Strategy for Mimic Defense. Master's thesis , Zhengzhou University at Zhengzhou. Zhang, Z.X., 2018. Research on Dynamic Scheduling Strategy for Mimic Defense. Master's thesis, Zhengzhou University at Zhengzhou."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0086"},{"key":"e_1_3_2_1_13_1","first-page":"354","volume-title":"\"Spnp: Stochastic petri nets. version 6.0.\" In International Conference on Modelling Techniques and Tools for Computer Performance Evaluation","author":"Hirel Christophe","year":"2000","unstructured":"Hirel , Christophe , Bruno Tuffin , and Kishor S. Trivedi . \"Spnp: Stochastic petri nets. version 6.0.\" In International Conference on Modelling Techniques and Tools for Computer Performance Evaluation , pp. 354 - 357 . Springer , Berlin, Heidelberg , 2000 . Hirel, Christophe, Bruno Tuffin, and Kishor S. Trivedi. \"Spnp: Stochastic petri nets. version 6.0.\" In International Conference on Modelling Techniques and Tools for Computer Performance Evaluation, pp. 354-357. Springer, Berlin, Heidelberg, 2000."}],"event":{"name":"ICNCC 2020: 2020 The 9th International Conference on Networks, Communication and Computing","acronym":"ICNCC 2020","location":"Tokyo Japan"},"container-title":["2020 The 9th International Conference on Networks, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447654.3447660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447654.3447660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:09Z","timestamp":1750200069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447654.3447660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,18]]},"references-count":13,"alternative-id":["10.1145\/3447654.3447660","10.1145\/3447654"],"URL":"https:\/\/doi.org\/10.1145\/3447654.3447660","relation":{},"subject":[],"published":{"date-parts":[[2020,12,18]]},"assertion":[{"value":"2021-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}