{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T16:42:15Z","timestamp":1720716135041},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2016YFB0800700","2016YFB0800704"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672515"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Science"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1016\/j.jocs.2018.11.003","type":"journal-article","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T12:21:34Z","timestamp":1541679694000},"page":"118-126","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["A game theoretic approach to cooperative intrusion detection"],"prefix":"10.1016","volume":"30","author":[{"given":"Yunchuan","family":"Guo","sequence":"first","affiliation":[]},{"given":"Han","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lingcui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Fenghua","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jocs.2018.11.003_bib0005","series-title":"Mobile Ad-Hoc Networks: Current Status and Future Trends","author":"Loo","year":"2016"},{"key":"10.1016\/j.jocs.2018.11.003_bib0010","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.adhoc.2013.08.017","article-title":"An intrusion detection & adaptive response mechanism for MANETs","volume":"13","author":"Nadeem","year":"2014","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.jocs.2018.11.003_bib0015","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2716260","article-title":"Taxonomy and survey of collaborative intrusion detection","volume":"47","author":"Vasilomanolakis","year":"2015","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jocs.2018.11.003_bib0020","first-page":"1","article-title":"Incentive mechanisms for participatory sensing: survey and research challenges","volume":"12","author":"Restuccia","year":"2016","journal-title":"ACM Trans. Sens. Netw."},{"key":"10.1016\/j.jocs.2018.11.003_bib0025","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1109\/TIFS.2015.2398363","article-title":"Privacy-preserving detection of sensitive data exposure","volume":"10","author":"Shu","year":"2015","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"10.1016\/j.jocs.2018.11.003_bib0030","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1093\/comjnl\/bxt019","article-title":"ZIDS: a privacy-preserving intrusion detection system using secure two-party computation protocols","volume":"57","author":"Niksefat","year":"2014","journal-title":"Comput. J."},{"key":"10.1016\/j.jocs.2018.11.003_bib0035","first-page":"7","article-title":"Privacy-preserving approach for sharing and processing intrusion alert data","author":"Do","year":"2015","journal-title":"Proc. IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)"},{"key":"10.1016\/j.jocs.2018.11.003_bib0040","first-page":"1","article-title":"Differential privacy for collaborative security","author":"Reed","year":"2010","journal-title":"Proc. the Third European Workshop on System Security"},{"key":"10.1016\/j.jocs.2018.11.003_bib0045","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/3055305.3055311","article-title":"On the tradeoff between privacy and utility in collaborative intrusion detection systems\u2014a game theoretical approach","author":"Jin","year":"2017","journal-title":"Proc. the Hot Topics in Science of Security: Symposium and Bootcamp (HotSoS)"},{"key":"10.1016\/j.jocs.2018.11.003_bib0050","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.cosrev.2017.07.001","article-title":"Privacy issues in intrusion detection systems: a taxonomy, survey and future directions","volume":"25","author":"Niksefat","year":"2017","journal-title":"Comput. Sci. Rev."},{"key":"10.1016\/j.jocs.2018.11.003_bib0055","first-page":"1","article-title":"Towards optimal monitoring in cooperative IDS for resource constrained wireless networks","author":"Hassanzadeh","year":"2011","journal-title":"Proc. of IEEE ICCCN"},{"key":"10.1016\/j.jocs.2018.11.003_bib0060","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.comnet.2013.08.026","article-title":"Trustworthy placements: improving quality and resilience in collaborative attack detection","volume":"58","author":"Gil Perez","year":"2014","journal-title":"Comput. Netw."},{"key":"10.1016\/j.jocs.2018.11.003_bib0065","first-page":"1","article-title":"Enhancing effectiveness of intrusion detection systems: a hybrid approach","author":"Subba","year":"2016","journal-title":"Proc. of IEEE International Conference on Advanced Networks and Telecommunications Systems"},{"key":"10.1016\/j.jocs.2018.11.003_bib0070","article-title":"Real-time data incentives for IoT searches","author":"Guo","year":"2018","journal-title":"IEEE International Conference on Communications"},{"key":"10.1016\/j.jocs.2018.11.003_bib0075","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1109\/TMC.2017.2714668","article-title":"Data quality guided incentive mechanism design for crowdsensing","volume":"17","author":"Peng","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.jocs.2018.11.003_bib0080","doi-asserted-by":"crossref","first-page":"2392","DOI":"10.1109\/TMC.2016.2632721","article-title":"A budget feasible incentive mechanism for weighted coverage maximization in mobile crowdsensing","volume":"16","author":"Zheng","year":"2017","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.jocs.2018.11.003_bib0085","doi-asserted-by":"crossref","first-page":"2588","DOI":"10.1109\/TMC.2016.2624732","article-title":"PLP: protecting location privacy against correlation analyze attack in crowdsensing","volume":"16","author":"Ma","year":"2017","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.jocs.2018.11.003_bib0090","first-page":"173","article-title":"Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing","author":"Yang","year":"2012","journal-title":"Proc. of IEEE MOBILCOM"},{"key":"10.1016\/j.jocs.2018.11.003_bib0095","first-page":"1006","article-title":"Utility-based cooperative decision in cooperative authentication","author":"Guo","year":"2014","journal-title":"Proc. of IEEE INFOCOM"},{"key":"10.1016\/j.jocs.2018.11.003_bib0100","first-page":"571","article-title":"Quality adaptive online double auction in participatory sensing","volume":"9","author":"Mukhopadhyay","year":"2017","journal-title":"J. Inform. Math. Sci."},{"key":"10.1016\/j.jocs.2018.11.003_bib0105","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11280-017-0432-6","article-title":"A game-theoretic approach to advertisement dissemination in ephemeral networks","volume":"21","author":"Yin","year":"2018","journal-title":"World Wide Web J."},{"key":"10.1016\/j.jocs.2018.11.003_bib0110","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TDSC.2015.2399291","article-title":"MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks","volume":"13","author":"Yu","year":"2016","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"10.1016\/j.jocs.2018.11.003_bib0115","article-title":"Game theory, evolutionary stable strategies and the evolution of biological interactions","volume":"3","author":"Cowden","year":"2012","journal-title":"Nat. Educ. Knowl."},{"key":"10.1016\/j.jocs.2018.11.003_bib0120","series-title":"Convex Optimization","author":"Boyd","year":"2004"},{"key":"10.1016\/j.jocs.2018.11.003_bib0125","first-page":"83","article-title":"Incentive mechanism for cooperative intrusion detection: an evolutionary game approach","author":"Guo","year":"2018","journal-title":"Proc. International Conference on Computational Science (ICCS)"}],"container-title":["Journal of Computational Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877750318310202?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877750318310202?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T10:43:39Z","timestamp":1565261019000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877750318310202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":25,"alternative-id":["S1877750318310202"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.jocs.2018.11.003","relation":{},"ISSN":["1877-7503"],"issn-type":[{"value":"1877-7503","type":"print"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A game theoretic approach to cooperative intrusion detection","name":"articletitle","label":"Article Title"},{"value":"Journal of Computational Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jocs.2018.11.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}