{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:6KCZ7VFTPKYLGCXEXLK2TSFE2V","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"f39480bc822804044cb2135f831c2fa49efd72fab2eedf9f8d100897cbc6ab25","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2018-08-24T09:46:22Z","title_canon_sha256":"ca977959238920d6fc13ed53d6e25e4a2e209772db9ddeec094fb1acde186bf5"},"schema_version":"1.0","source":{"id":"1808.08066","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1808.08066","created_at":"2026-05-18T00:07:22Z"},{"alias_kind":"arxiv_version","alias_value":"1808.08066v1","created_at":"2026-05-18T00:07:22Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1808.08066","created_at":"2026-05-18T00:07:22Z"},{"alias_kind":"pith_short_12","alias_value":"6KCZ7VFTPKYL","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_16","alias_value":"6KCZ7VFTPKYLGCXE","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_8","alias_value":"6KCZ7VFT","created_at":"2026-05-18T12:32:08Z"}],"graph_snapshots":[{"event_id":"sha256:d0e72982e0b801b0bf53a791a0833d8b6b77441ec0b8a0ca12f0ef7dc186eeb7","target":"graph","created_at":"2026-05-18T00:07:22Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to ","authors_text":"Quanyan Zhu, Stefan Rass","cross_cats":[],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2018-08-24T09:46:22Z","title":"Game Theory Meets Network Security: A Tutorial at ACM CCS"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1808.08066","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:8e4244cec67437796b686e4d18ab41c1387d5951ad8117c8550d7f9a230c2421","target":"record","created_at":"2026-05-18T00:07:22Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"f39480bc822804044cb2135f831c2fa49efd72fab2eedf9f8d100897cbc6ab25","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2018-08-24T09:46:22Z","title_canon_sha256":"ca977959238920d6fc13ed53d6e25e4a2e209772db9ddeec094fb1acde186bf5"},"schema_version":"1.0","source":{"id":"1808.08066","kind":"arxiv","version":1}},"canonical_sha256":"f2859fd4b37ab0b30ae4bad5a9c8a4d548f63d7fe558f8d70a7d08436d1bd680","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"f2859fd4b37ab0b30ae4bad5a9c8a4d548f63d7fe558f8d70a7d08436d1bd680","first_computed_at":"2026-05-18T00:07:22.533464Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:07:22.533464Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"3d4PdcSD+ZKGxxGFMobKhRey9OKxlgNdxuro0qqE5PctPhrApTjRn2NX30WYLdo0f00AvgFNGAlLqwhmqEIoDQ==","signature_status":"signed_v1","signed_at":"2026-05-18T00:07:22.534172Z","signed_message":"canonical_sha256_bytes"},"source_id":"1808.08066","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:8e4244cec67437796b686e4d18ab41c1387d5951ad8117c8550d7f9a230c2421","sha256:d0e72982e0b801b0bf53a791a0833d8b6b77441ec0b8a0ca12f0ef7dc186eeb7"],"state_sha256":"610b734df1ed961486b3e549775e62a9e7b45ad38f22d6a65f74f66ccba1a3b0"}