{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:NERPYSNBIHNDZMOGDEIKDM7SS2","short_pith_number":"pith:NERPYSNB","schema_version":"1.0","canonical_sha256":"6922fc49a141da3cb1c61910a1b3f296ab564573554b545e9996987c9c7faffe","source":{"kind":"arxiv","id":"1810.00092","version":1},"attestation_state":"computed","paper":{"title":"The Partially Observable Games We Play for Cyber Deception","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.OC"],"primary_cat":"cs.AI","authors_text":"Joost-Pieter Katoen, Mohamadreza Ahmadi, Murat Cubuktepe, Nils Jansen, Sebastian Junges, Ufuk Topcu","submitted_at":"2018-09-28T21:42:41Z","abstract_excerpt":"Progressively intricate cyber infiltration mechanisms have made conventional means of defense, such as firewalls and malware detectors, incompetent. These sophisticated infiltration mechanisms can study the defender's behavior, identify security caveats, and modify their actions adaptively. To tackle these security challenges, cyber-infrastructures require active defense techniques that incorporate cyber deception, in which the defender (deceiver) implements a strategy to mislead the infiltrator. To this end, we use a two-player partially observable stochastic game (POSG) framework, wherein th"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1810.00092","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.AI","submitted_at":"2018-09-28T21:42:41Z","cross_cats_sorted":["math.OC"],"title_canon_sha256":"c37d0f62b5e58971a1e5fdfbf98a6bc0cacfe38f4b024882e20b444ae36cd6fc","abstract_canon_sha256":"4446f0fec9ce648359a4c1d6f7187b944ee59b0f83868faba9895dd784af5507"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:04:28.820059Z","signature_b64":"LTu+JwhfmqYT9mK8FGB8f1oJhATezs8oMrObQW/FubexnVfxGk0IGbeVWFCW2nPEkE8n5ItaSGpbUnN6hcBADw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"6922fc49a141da3cb1c61910a1b3f296ab564573554b545e9996987c9c7faffe","last_reissued_at":"2026-05-18T00:04:28.819434Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:04:28.819434Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"The Partially Observable Games We Play for Cyber Deception","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.OC"],"primary_cat":"cs.AI","authors_text":"Joost-Pieter Katoen, Mohamadreza Ahmadi, Murat Cubuktepe, Nils Jansen, Sebastian Junges, Ufuk Topcu","submitted_at":"2018-09-28T21:42:41Z","abstract_excerpt":"Progressively intricate cyber infiltration mechanisms have made conventional means of defense, such as firewalls and malware detectors, incompetent. These sophisticated infiltration mechanisms can study the defender's behavior, identify security caveats, and modify their actions adaptively. To tackle these security challenges, cyber-infrastructures require active defense techniques that incorporate cyber deception, in which the defender (deceiver) implements a strategy to mislead the infiltrator. To this end, we use a two-player partially observable stochastic game (POSG) framework, wherein th"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.00092","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1810.00092","created_at":"2026-05-18T00:04:28.819528+00:00"},{"alias_kind":"arxiv_version","alias_value":"1810.00092v1","created_at":"2026-05-18T00:04:28.819528+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.00092","created_at":"2026-05-18T00:04:28.819528+00:00"},{"alias_kind":"pith_short_12","alias_value":"NERPYSNBIHND","created_at":"2026-05-18T12:32:40.477152+00:00"},{"alias_kind":"pith_short_16","alias_value":"NERPYSNBIHNDZMOG","created_at":"2026-05-18T12:32:40.477152+00:00"},{"alias_kind":"pith_short_8","alias_value":"NERPYSNB","created_at":"2026-05-18T12:32:40.477152+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/NERPYSNBIHNDZMOGDEIKDM7SS2","json":"https://pith.science/pith/NERPYSNBIHNDZMOGDEIKDM7SS2.json","graph_json":"https://pith.science/api/pith-number/NERPYSNBIHNDZMOGDEIKDM7SS2/graph.json","events_json":"https://pith.science/api/pith-number/NERPYSNBIHNDZMOGDEIKDM7SS2/events.json","paper":"https://pith.science/paper/NERPYSNB"},"agent_actions":{"view_html":"https://pith.science/pith/NERPYSNBIHNDZMOGDEIKDM7SS2","download_json":"https://pith.science/pith/NERPYSNBIHNDZMOGDEIKDM7SS2.json","view_paper":"https://pith.science/paper/NERPYSNB","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1810.00092&json=true","fetch_graph":"https://pith.science/api/pith-number/NERPYSNBIHNDZMOGDEIKDM7SS2/graph.json","fetch_events":"https://pith.science/api/pith-number/NERPYSNBIHNDZMOGDEIKDM7SS2/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/NERPYSNBIHNDZMOGDEIKDM7SS2/action/timestamp_anchor","attest_storage":"https://pith.science/pith/NERPYSNBIHNDZMOGDEIKDM7SS2/action/storage_attestation","attest_author":"https://pith.science/pith/NERPYSNBIHNDZMOGDEIKDM7SS2/action/author_attestation","sign_citation":"https://pith.science/pith/NERPYSNBIHNDZMOGDEIKDM7SS2/action/citation_signature","submit_replication":"https://pith.science/pith/NERPYSNBIHNDZMOGDEIKDM7SS2/action/replication_record"}},"created_at":"2026-05-18T00:04:28.819528+00:00","updated_at":"2026-05-18T00:04:28.819528+00:00"}