{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:39:07Z","timestamp":1763102347179,"version":"3.45.0"},"reference-count":24,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.059724","type":"journal-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T04:11:45Z","timestamp":1737346305000},"page":"1451-1470","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Evolution Analysis of Network Attack and Defense Situation Based on Game Theory"],"prefix":"10.32604","volume":"83","author":[{"given":"Haiyan","family":"Sun","sequence":"first","affiliation":[]},{"given":"Chenglong","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wanwei","family":"Huang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"120875","DOI":"10.1016\/j.ins.2024.120875","article-title":"A generic approach for network defense strategies generation based on evolutionary game theory","volume":"677","author":"Liu","year":"2021 Aug","journal-title":"Inf Sci"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"109635","DOI":"10.1016\/j.comnet.2023.109635","article-title":"A differential game approach for real-time security defense decision in scale-free networks","volume":"224","author":"Zhang","year":"2023 Apr","journal-title":"Comput Netw"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.jksuci.2023.01.018","article-title":"Evolutionary game decision-making method for network attack and defense based on regret minimization algorithm","volume":"35","author":"Jin","year":"2023 Mar","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"100544","DOI":"10.1016\/j.cosrev.2023.100544","article-title":"A survey: when moving target defense meets game theory","volume":"48","author":"Tan","year":"2023 May","journal-title":"Comput Sci Rev"},{"key":"ref5","first-page":"343","article-title":"Defense decision-making method for multi-path combined attack based on non-zero-sum game","volume":"49","author":"Sun","year":"2019","journal-title":"Nat Sci Ed"},{"key":"ref6","series-title":"2019 International Conference on Computing, Networking and Communications (ICNC)","first-page":"577","article-title":"Adaptive MTD security using markov game modeling","author":"Chowdhary","year":"2009"},{"key":"ref7","first-page":"35","article-title":"Military information network security risk assessment based on attack and defense game","volume":"33","author":"Wang","year":"2019","journal-title":"Military Operat Res Syst Eng"},{"key":"ref8","first-page":"1918","article-title":"Research on network attack and defense situation based on game theory model and NetLogo simulation","volume":"32","author":"Liu","year":"2020","journal-title":"J Syst Simulat"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2897","DOI":"10.1080\/00207721.2024.2363546","article-title":"Defense strategy selection based on incomplete information game for the false data injection attack","volume":"55","author":"Yi","year":"2024 Oct","journal-title":"Int J Syst Sci"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"115","DOI":"10.23919\/PCMP.2023.000138","article-title":"Game theory based optimal defensive resources allocation with incomplete information in cyber-physical power systems against false data injection attacks","volume":"9","author":"Yan","year":"2024 Mar","journal-title":"Prot Control Mod Power Syst"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"222302","DOI":"10.1007\/s11432-020-3228-8","article-title":"Differential game-based analysis of multi-attacker multi-defender interaction","volume":"64","author":"Gao","year":"2021 Dec","journal-title":"Sci China Inf Sci"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"8353","DOI":"10.1109\/TIFS.2024.3451189","article-title":"A deep reinforcement learning-based deception asset selection algorithm in differential games","volume":"19","author":"He","year":"2024","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"103187","DOI":"10.1016\/j.cose.2023.103187","article-title":"Security defense decision method based on potential differential game for complex networks","volume":"129","author":"Zhang","year":"2023 Jun","journal-title":"Comput Secur"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"103871","DOI":"10.1016\/j.cose.2024.103871","article-title":"A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning","volume":"142","author":"Tang","year":"2024 Jul","journal-title":"Comput Secur"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2023\/5560416","article-title":"Flipit game deception strategy selection method based on deep reinforcement learning","volume":"2023","author":"He","year":"2023 Sep","journal-title":"Int J Intell Syst"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"39621","DOI":"10.1109\/ACCESS.2018.2848242","article-title":"Markov differential game for network defense decision-making method","volume":"6","author":"Huang","year":"2018","journal-title":"IEEE Access"},{"key":"ref17","series-title":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","first-page":"28","article-title":"Selection of optimal strategy for moving target defense based on signal game","author":"Sun","year":"2020 Dec"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1109\/CC.2015.7224695","article-title":"Security defence policy selection method using the incomplete information game model","volume":"12","author":"Zhang","year":"2015","journal-title":"China Commun"},{"key":"ref19","series-title":"2023 6th International Conference on Contemporary Computing and Informatics (IC3I)","first-page":"1180","article-title":"A study of CVSS v4.0: a CVE scoring system","author":"Aggarwal","year":"2023 Sep"},{"key":"ref20","first-page":"803","article-title":"Cybersecurity challenges from the perspective of emergence","volume":"57","author":"Qu","year":"2020","journal-title":"J Comput Res Dev"},{"key":"ref21","first-page":"709","article-title":"Virus propagation model and stability under the hybrid mechanism of \u2018two-go and one-live\u2019","volume":"41","author":"Wang","year":"2019","journal-title":"J Elect Informat Technol"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"929","DOI":"10.3390\/math9090929","article-title":"Dynamical analysis and optimal control for a SEIR model based on virus mutation in WSNs","volume":"9","author":"Liu","year":"2021 Apr","journal-title":"Mathematics"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2024\/3943882","article-title":"Dynamics and control strategies for SLBRS model of computer viruses based on complex networks","volume":"2024","author":"Tang","year":"2024 May","journal-title":"Int J Intell Syst"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"e136","DOI":"10.1002\/spy2.136","article-title":"Research on the game of network security attack-defense confrontation through the optimal defense strategy","volume":"4","author":"Liu","year":"2021 Jan","journal-title":"Secur Priv"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_59724\/TSP_CMC_59724.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:34:35Z","timestamp":1763102075000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.059724","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-10-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}