{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T23:56:26Z","timestamp":1769903786819,"version":"3.49.0"},"reference-count":15,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFC0820700"],"award-info":[{"award-number":["2017YFC0820700"]}]},{"name":"National Key R&D Program of China","award":["KJ-17-101"],"award-info":[{"award-number":["KJ-17-101"]}]},{"name":"National Key R&D Program of China","award":["61701020"],"award-info":[{"award-number":["61701020"]}]},{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"crossref","award":["2017YFC0820700"],"award-info":[{"award-number":["2017YFC0820700"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"crossref","award":["KJ-17-101"],"award-info":[{"award-number":["KJ-17-101"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"crossref","award":["61701020"],"award-info":[{"award-number":["61701020"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFC0820700"],"award-info":[{"award-number":["2017YFC0820700"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["KJ-17-101"],"award-info":[{"award-number":["KJ-17-101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61701020"],"award-info":[{"award-number":["61701020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018,8,1]]},"abstract":"<jats:p>Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing.<\/jats:p>","DOI":"10.1155\/2018\/1821804","type":"journal-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T23:33:02Z","timestamp":1533166382000},"page":"1-9","source":"Crossref","is-referenced-by-count":19,"title":["A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing"],"prefix":"10.1155","volume":"2018","author":[{"given":"Xingshuo","family":"An","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5287-5226","authenticated-orcid":true,"given":"Fuhong","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, China"}]},{"given":"Shenggang","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, China"}]},{"given":"Li","family":"Miao","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, China"}]},{"given":"Chao","family":"Gong","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, China"}]}],"member":"311","reference":[{"key":"2","first-page":"1","year":"2018","journal-title":"Wireless Communications and Mobile Computing"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7224698"},{"issue":"1","key":"4","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/MWC.2017.1700015","volume":"25","year":"2018","journal-title":"IEEE Wireless Communications"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2670570"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7472095","volume":"2018","year":"2018","journal-title":"Wireless Communications and Mobile Computing"},{"key":"9","year":"2018","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2007.012248"},{"key":"11","year":"2005","journal-title":"System Engineering and Electronics"},{"issue":"2","key":"12","first-page":"395","volume":"25","year":"2013","journal-title":"IEEE Transactions on Parallel and Distributed System"},{"issue":"5","key":"13","first-page":"747","volume":"45","year":"2013","journal-title":"Journal of Computer Research and Development"},{"issue":"2","key":"14","first-page":"253","volume":"27","year":"2006","journal-title":"Journal of Chinese Computer System"},{"key":"15","first-page":"263","volume-title":"Game Theoretic Attack Response Framework for Enterprise Networks","volume":"8337","year":"2014"},{"key":"16","year":"2006"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7839768"},{"issue":"1","key":"18","doi-asserted-by":"crossref","first-page":"20","DOI":"10.2307\/3003317","volume":"10","year":"1979","journal-title":"Bell Journal of Economics"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/1821804.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/1821804.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/1821804.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T22:48:58Z","timestamp":1589928538000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/1821804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,1]]},"references-count":15,"alternative-id":["1821804","1821804"],"URL":"https:\/\/doi.org\/10.1155\/2018\/1821804","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,1]]}}}