{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:56:34Z","timestamp":1725612994995},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/ares.2016.96","type":"proceedings-article","created":{"date-parts":[[2016,12,17]],"date-time":"2016-12-17T07:53:22Z","timestamp":1481961202000},"page":"437-443","source":"Crossref","is-referenced-by-count":2,"title":["A Security Game Model for Remote Software Protection"],"prefix":"10.1109","author":[{"given":"Nicola","family":"Basilico","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Lanzi","sequence":"additional","affiliation":[]},{"given":"Mattia","family":"Monga","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2016","key":"ref10","article-title":"A software protection game (Github repository)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.22"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.27"},{"year":"2009","key":"ref13","article-title":"Themida"},{"year":"2009","key":"ref14","article-title":"Code Virtualizer"},{"year":"2009","key":"ref15","article-title":"VMProtect"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/314602.314606"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"journal-title":"Multiagent Systems Algorithmic Game-Theoretic and Logical Foundations","year":"2009","author":"shoham","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14215-4_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095812"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420997"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.158"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.03.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031"},{"key":"ref2","first-page":"21","article-title":"Establishing the genuinity of remote computer systems","author":"kennell","year":"2003","journal-title":"Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12 SSYM"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.34"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134717"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.18.5.107"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.4317","article-title":"Game-theoretic patrolling with dynamic execution uncertainty and a case study on a real transit system","author":"delle fave","year":"2014","journal-title":"Journal of Artificial Intelligence Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1160633.1160681"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.30"},{"key":"ref23","first-page":"905","article-title":"Game-theoretic resouroce allocation for maliciouspacket detection in computer networks","author":"van?k","year":"2012","journal-title":"Proceedingsof the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2 International Foundation for Autonomous Agents and Multiagent Systems"}],"event":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES )","start":{"date-parts":[[2016,8,31]]},"location":"Salzburg, Austria","end":{"date-parts":[[2016,9,2]]}},"container-title":["2016 11th International Conference on Availability, Reliability and Security (ARES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7777698\/7784494\/07784603.pdf?arnumber=7784603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T16:47:00Z","timestamp":1568652420000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7784603\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":24,"URL":"http:\/\/dx.doi.org\/10.1109\/ares.2016.96","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}