{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:52:48Z","timestamp":1773615168525,"version":"3.50.1"},"reference-count":9,"publisher":"Allerton Press","issue":"2","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.3103\/s0146411619020123","type":"journal-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T04:02:59Z","timestamp":1559880179000},"page":"140-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Study on the Attacking Intelligent Decision-Making Technology Based on the Game Theory"],"prefix":"10.3103","volume":"53","author":[{"family":"Yun Zhang","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,6,7]]},"reference":[{"key":"7114_CR1","unstructured":"Pathak, R., Joshi, S., Ludhiani, A., et al., Strategic decision-making and game theoretic approach for the commercialization of nanotechnology, Intell. Econ., 2010, no. 2, pp. 47\u201356."},{"key":"7114_CR2","doi-asserted-by":"publisher","first-page":"e1239","DOI":"10.1016\/j.na.2009.01.154","volume":"71","author":"J.A. Reneke","year":"2009","unstructured":"Reneke, J.A., A game theory formulation of decision making under conditions of uncertainty and risk, Nonlinear Anal., 2009, vol. 71, pp. e1239\u2013e1246.","journal-title":"Nonlinear Anal."},{"key":"7114_CR3","unstructured":"Zhang, Y., Li, W.H., and Chen, Y., Applying balanced ScordCard strategic performance management to CRISP-DM, 2011 International Conference on Computational Intelligence and Security (CIS2011), Guangzhou, 2011, pp. 247\u2013251."},{"key":"7114_CR4","first-page":"418","volume":"29","author":"Y. Zhang","year":"2011","unstructured":"Zhang, Y., Li, W.H., and Chen, Y., Applying ACMC Strategy to multidimensional data mining, J. Northwest. Polytech. Univ., 2011, vol. 29, no. 3, pp. 418\u2013423.","journal-title":"J. Northwest. Polytech. Univ."},{"key":"7114_CR5","doi-asserted-by":"publisher","unstructured":"Zhang, Y. and Li, W.H., AHP Construct Mining Component strategy applied for data mining process, 2012 International Conference on Information Science and Technology (ICIST), 2012. https:\/\/doi.org\/10.1109\/ICIST.2012.6221714","DOI":"10.1109\/ICIST.2012.6221714"},{"key":"7114_CR6","first-page":"7","volume":"37","author":"Z.X. Yao","year":"2007","unstructured":"Yao, Z.X., Li, M., and Chen, Z.G., Mission decision-making method of multi-aircraft cooperative attack multi-object based on game theory model, Aeronaut. Comput. Tech., 2007, vol. 37, no. 3, pp. 7\u201311.","journal-title":"Aeronaut. Comput. Tech."},{"key":"7114_CR7","first-page":"9","volume":"9","author":"X.Y. Zhao","year":"2002","unstructured":"Zhao, X.Y., Nash equilibrium solution of two-person non-cooperative game, J. Lanzhou Polytech. Coll., 2002, vol. 9, no. 1, pp. 9\u201312.","journal-title":"J. Lanzhou Polytech. Coll."},{"key":"7114_CR8","unstructured":"Lindemann-von Trzebiatowski, G. and M\u00fcnch, I., The role concept for agents in multiagent systems, Sozionik-Actuell, 2001. http:\/\/www.informatik.uni-hamburg.de\/TGI\/forschung\/projekte\/sozionik\/journal\/3\/masho-3.pdf. Accessed November 2001."},{"key":"7114_CR9","first-page":"282","volume":"23","author":"Y.H. Tao","year":"2002","unstructured":"Tao, Y.H., How to make fuzzy consistent judgment matrix of the FAHP, J. Sichuan Teach. Coll.\n                           (Nat. Sci.), 2002, vol. 23, no. 3, pp. 282\u2013285.","journal-title":"Nat. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619020123.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619020123","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619020123.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:56:15Z","timestamp":1773611775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619020123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":9,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["7114"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619020123","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3]]},"assertion":[{"value":"24 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}