{"id":"https://openalex.org/W4391557931","doi":"https://doi.org/10.1109/icdmw60847.2023.00047","title":"Data Intrusion Tolerance Model based on Game Theory for Energy Internet","display_name":"Data Intrusion Tolerance Model based on Game Theory for Energy Internet","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4391557931","doi":"https://doi.org/10.1109/icdmw60847.2023.00047"},"language":"en","primary_location":{"id":"doi:10.1109/icdmw60847.2023.00047","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icdmw60847.2023.00047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Data Mining Workshops (ICDMW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101191680","display_name":"Zhanwang Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhanwang Zhu","raw_affiliation_strings":["Nanjing University of Posts &amp; Telecommunication,College of Automation,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts &amp; Telecommunication,College of Automation,Nanjing,China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001264246","display_name":"Yiming Yuan","orcid":"https://orcid.org/0000-0003-3472-9708"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiming Yuan","raw_affiliation_strings":["Nanjing University of Posts &amp; Telecommunication,College of Automation,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts &amp; Telecommunication,College of Automation,Nanjing,China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001770391","display_name":"Song Deng","orcid":"https://orcid.org/0000-0002-8976-6592"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Song Deng","raw_affiliation_strings":["Nanjing University of Posts &amp; Telecommunication,Institute of Advanced Technology,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts &amp; Telecommunication,Institute of Advanced Technology,Nanjing,China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101191680"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25138692,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"203","issue":null,"first_page":"323","last_page":"328"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7062066197395325},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.6669070720672607},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6075246930122375},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5785923600196838},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4972398579120636},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4367137849330902},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3493920564651489},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2090761363506317},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.06975951790809631}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7062066197395325},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.6669070720672607},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6075246930122375},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5785923600196838},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4972398579120636},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4367137849330902},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3493920564651489},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2090761363506317},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.06975951790809631},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdmw60847.2023.00047","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icdmw60847.2023.00047","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Data Mining Workshops (ICDMW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W44528998","https://openalex.org/W2092739151","https://openalex.org/W2106267320","https://openalex.org/W2120839938","https://openalex.org/W2289571706","https://openalex.org/W2529866846","https://openalex.org/W2564062564","https://openalex.org/W2575062763","https://openalex.org/W2604252918","https://openalex.org/W2752214915","https://openalex.org/W2781662152","https://openalex.org/W2793013392","https://openalex.org/W2896832338","https://openalex.org/W2928077458","https://openalex.org/W2941521725","https://openalex.org/W2946184158","https://openalex.org/W2963401802","https://openalex.org/W3176452147","https://openalex.org/W3191253460","https://openalex.org/W4251204506"],"related_works":["https://openalex.org/W2352562479","https://openalex.org/W2389356976","https://openalex.org/W2356891656","https://openalex.org/W34565110","https://openalex.org/W2347413713","https://openalex.org/W2133389611","https://openalex.org/W3086410590","https://openalex.org/W136910588","https://openalex.org/W2353050426","https://openalex.org/W1539957869"],"abstract_inverted_index":{"The":[0],"open":[1],"and":[2,30,47,78,83],"shared":[3],"environment":[4],"makes":[5],"it":[6],"unavoidable":[7],"to":[8,20,119],"face":[9],"data":[10,21,39,61],"attacks":[11],"in":[12,49],"the":[13,16,28,33,76,89,94,101,110,114],"context":[14],"of":[15,24,32,80,116],"energy":[17,34,111],"internet.":[18,35],"Tolerance":[19],"intrusion":[22,40,62,122],"is":[23,72],"utmost":[25],"importance":[26],"for":[27,38,107],"security":[29],"stability":[31],"Existing":[36],"methods":[37],"tolerance":[41,51,63,123],"suffer":[42],"from":[43],"insufficient":[44],"dynamic":[45],"adaptability":[46],"challenges":[48],"determining":[50],"levels.":[52],"To":[53],"address":[54],"these":[55],"issues,":[56],"this":[57],"paper":[58],"introduces":[59],"a":[60],"model":[64,102],"based":[65],"on":[66,93],"game":[67,86,117],"theory.":[68,87],"A":[69],"Nash":[70],"equilibrium":[71],"established":[73],"by":[74],"analyzing":[75],"gains":[77],"losses":[79],"both":[81],"attackers":[82],"defenders":[84],"through":[85],"Finally,":[88],"simulation":[90],"results":[91],"conducted":[92],"IEEE":[95],"14-bus":[96],"node":[97],"system":[98],"illustrate":[99],"that":[100],"we":[103],"propose":[104],"offers":[105],"guidance":[106],"decision-making":[108],"within":[109],"internet,":[112],"enabling":[113],"utilization":[115],"theory":[118],"determine":[120],"optimal":[121],"strategies.":[124]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
