{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T03:48:52Z","timestamp":1765079332420},"reference-count":24,"publisher":"SAGE Publications","issue":"10","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1177\/1550147717737908","type":"journal-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T06:10:33Z","timestamp":1508911833000},"page":"155014771773790","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Cyber security based on mean field game model of the defender: Attacker strategies"],"prefix":"10.1177","volume":"13","author":[{"given":"Li","family":"Miao","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science &amp; Technology Beijing (USTB), Beijing, P.R. China"}]},{"given":"Shuai","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science &amp; Technology Beijing (USTB), Beijing, P.R. China"}]}],"member":"179","published-online":{"date-parts":[[2017,10,24]]},"reference":[{"key":"bibr1-1550147717737908","first-page":"54","volume-title":"International conference on applications and techniques in information security","author":"Chowdhury A"},{"key":"bibr2-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00056"},{"issue":"11","key":"bibr3-1550147717737908","first-page":"1","volume":"58","author":"Zhang HG","year":"2015","journal-title":"Sci China Inform Sci"},{"key":"bibr4-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2183642"},{"key":"bibr5-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.83.065101"},{"key":"bibr6-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"bibr7-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511760778"},{"key":"bibr8-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1002\/sec.949"},{"key":"bibr9-1550147717737908","first-page":"7","volume-title":"Third annual cyber security and information infrastructure research workshop","author":"Dingankar C"},{"key":"bibr10-1550147717737908","first-page":"274","volume-title":"International workshop on security and trust management","author":"Ryutov T"},{"key":"bibr11-1550147717737908","first-page":"648","volume-title":"2008 IEEE international conference on networking, sensing and control","author":"Jiang W"},{"key":"bibr12-1550147717737908","first-page":"319","volume-title":"International conference on decision and game theory for security","author":"Farhang S"},{"key":"bibr13-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1016\/j.crma.2006.09.019"},{"key":"bibr14-1550147717737908","doi-asserted-by":"crossref","first-page":"221","DOI":"10.4310\/CIS.2006.v6.n2.a2","volume":"6","author":"Huang M","year":"2006","journal-title":"Commun Inf Syst"},{"key":"bibr15-1550147717737908","volume-title":"Mean field games and applications to economics","author":"Gu\u00e9ant O","year":"2009"},{"key":"bibr16-1550147717737908","author":"Djehiche B","year":"2016","journal-title":"Mean-field-type games in engineering"},{"key":"bibr17-1550147717737908","first-page":"671","volume-title":"2012 conference record of the forty sixth asilomar conference on signals, systems and computers","author":"M\u00e9riaux F"},{"key":"bibr18-1550147717737908","unstructured":"Tembine H, Vilanova P, Debbah M. Noisy mean field stochastic games with network applications. Report, Ecole superieure d\u2019electricite, Paris, December 2010."},{"key":"bibr19-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1137\/140985676"},{"key":"bibr20-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14660-2_3"},{"key":"bibr21-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.122313.131118"},{"key":"bibr23-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpur.2009.10.010"},{"key":"bibr24-1550147717737908","doi-asserted-by":"publisher","DOI":"10.1007\/s00245-013-9202-8"},{"key":"bibr25-1550147717737908","doi-asserted-by":"publisher","DOI":"10.5539\/ijsp.v1n1p77"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717737908","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147717737908","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717737908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T08:21:49Z","timestamp":1659687709000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147717737908"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":24,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2017,10,5]]},"published-print":{"date-parts":[[2017,10]]}},"alternative-id":["10.1177\/1550147717737908"],"URL":"https:\/\/doi.org\/10.1177\/1550147717737908","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10]]}}}